Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Securing User Authentication with Server-Side Voice Verification
(Articles)
Deepak R. Chandran
,
Sanath Kumar
,
S. Deepashri
Journal of Computer and Communications
Vol.11 No.5
,May 30, 2023
DOI:
10.4236/jcc.2023.115010
114
Downloads
505
Views
Citations
Research on New English Mobile Teaching Mode under the Impact of Mobile Internet Age
(Articles)
Dan Xu
Open Journal of Social Sciences
Vol.7 No.5
,May 13, 2019
DOI:
10.4236/jss.2019.75008
1,132
Downloads
2,251
Views
Citations
iPhone Security Analysis
(Articles)
Vaibhav Ranchhoddas Pandya
,
Mark Stamp
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12009
7,078
Downloads
15,352
Views
Citations
Resource Optimisation for 3rd Generation Partnership Project (3GPP) Long Term Evolution OFDMA Downlink Interface Air
(Articles)
Ayoola Akinloye Akinniranye
,
Samson Adenle Oyetunji
Wireless Engineering and Technology
Vol.4 No.4
,October 29, 2013
DOI:
10.4236/wet.2013.44028
4,552
Downloads
6,950
Views
Citations
Wireless Network Security Threats and Mitigation—A Survey
(Articles)
Mohammad Bajwa
Open Journal of Business and Management
Vol.2 No.4
,September 18, 2014
DOI:
10.4236/ojbm.2014.24034
7,741
Downloads
9,274
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,997
Downloads
5,185
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
160
Downloads
691
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Design of Network Architecture Using Mobile Gateways for DLNA Devices in Wide Area Networks
(Articles)
Hiroaki Goto
,
Hideki Shimada
,
Kenya Sato
Communications and Network
Vol.4 No.4
,November 30, 2012
DOI:
10.4236/cn.2012.44037
5,656
Downloads
8,656
Views
Citations
Software Agent Structure for Performance Index Improvement of Cellular Network
(Articles)
Megha Kamble
,
Roopam Gupta
Int'l J. of Communications, Network and System Sciences
Vol.7 No.9
,September 2, 2014
DOI:
10.4236/ijcns.2014.79035
2,936
Downloads
3,571
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,646
Downloads
5,066
Views
Citations
Secure Cloud Based Approach for Mobile Devices User Data
(Articles)
Oscar Mbae
,
David Mwathi
,
Edna Too
Open Access Library Journal
Vol.9 No.9
,September 27, 2022
DOI:
10.4236/oalib.1109264
59
Downloads
545
Views
Citations
Reliable Multicast with Network Coding in Lossy Wireless Networks
(Articles)
Wei Yan
,
Shengyu Yu
,
Yueming Cai
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310110
4,801
Downloads
8,703
Views
Citations
The Impact Study of Houseplants in Purification of Environment Using Wireless Sensor Network
(Articles)
Kalpana A. Kulkarni
,
Madhukar S. Zambare
Wireless Sensor Network
Vol.10 No.3
,March 31, 2018
DOI:
10.4236/wsn.2018.103003
1,700
Downloads
8,264
Views
Citations
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812043
8,739
Downloads
12,659
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
Research on Wireless Sensor Networks Topology Models
(Articles)
Ziqing Zhang
,
Hai Zhao
,
Jian Zhu
,
Dazhou Li
Journal of Software Engineering and Applications
Vol.3 No.12
,December 31, 2010
DOI:
10.4236/jsea.2010.312137
6,835
Downloads
13,362
Views
Citations
Distributed C-Means Algorithm for Big Data Image Segmentation on a Massively Parallel and Distributed Virtual Machine Based on Cooperative Mobile Agents
(Articles)
Fatéma Zahra Benchara
,
Mohamed Youssfi
,
Omar Bouattane
,
Hassan Ouajji
,
Mohammed Ouadi Bensalah
Journal of Software Engineering and Applications
Vol.8 No.3
,March 3, 2015
DOI:
10.4236/jsea.2015.83011
2,869
Downloads
3,813
Views
Citations
A Load Service System with Reputation Proof in P2P Networks
(Articles)
Ming-Chang Huang
Journal of Computer and Communications
Vol.3 No.4
,April 10, 2015
DOI:
10.4236/jcc.2015.34004
2,355
Downloads
2,966
Views
Citations
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
(Articles)
Yong Wang
,
Jinsong Xi
,
Tong Cheng
Journal of Information Security
Vol.12 No.1
,January 11, 2021
DOI:
10.4236/jis.2021.121002
2,527
Downloads
9,414
Views
Citations
A Perspective on Traffic Measurement Tools in Wireless Networks
(Articles)
Ramesh Babu H. Siddamallaiah
,
Gowrishankar Subramanian
,
Piriyapatna S. Satyanarayana
Wireless Engineering and Technology
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/wet.2010.11003
5,559
Downloads
10,420
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
832
Downloads
5,209
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top