Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
(Articles)
A. R. Rajeswari
,
K. Kulothungan
,
S. Ganapathy
,
A. Kannan
Circuits and Systems
Vol.7 No.8
,June 30, 2016
DOI:
10.4236/cs.2016.78180
1,960
Downloads
3,653
Views
Citations
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks
(Articles)
Sung-Jib Yim
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49032
5,798
Downloads
10,422
Views
Citations
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN
(Articles)
Mohanbabu Gopalakrishnan
,
Gopi Saminathan Arumugam
,
Karthigai Lakshmi
,
Shanmuga Vel
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78123
1,683
Downloads
3,191
Views
Citations
Reduce Malicious Activity in Trusted Programs
(Articles)
Elliot Ito
,
Depeng Li
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010003
71
Downloads
473
Views
Citations
A Direct Trust dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)
(Articles)
Shaik Sahil Babu
,
Arnab Raha
,
Mrinal Kanti Naskar
Wireless Sensor Network
Vol.3 No.4
,March 31, 2011
DOI:
10.4236/wsn.2011.34015
6,515
Downloads
13,904
Views
Citations
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
(Articles)
S. Gopalakrishnan
,
P. Mohan Kumar
Circuits and Systems
Vol.7 No.6
,May 12, 2016
DOI:
10.4236/cs.2016.76064
2,463
Downloads
4,301
Views
Citations
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
883
Downloads
1,795
Views
Citations
This article belongs to the Special Issue on
Power System Protection
Ulcerated Nodal Metastasis in Penile Carcinoma
(Articles)
Krishnamachar Harish
,
Yagachikatte Chikkanarasaiah Madhu
Open Journal of Urology
Vol.1 No.4
,October 31, 2011
DOI:
10.4236/oju.2011.14019
5,872
Downloads
12,071
Views
Citations
Efficient Location Services Using Hierarchical Topology of Mobile Ad Hoc Networks
(Articles)
Prasad Naik Hamsavath
,
G. V. Singh
Journal of Software Engineering and Applications
Vol.5 No.1
,December 31, 2011
DOI:
10.4236/jsea.2012.51003
4,830
Downloads
8,081
Views
Citations
Sonographically guided lymph node biopsy: Complication rates
(Articles)
Michael Mueller
,
Genia Wittich
,
Suemeyra Oeztuerk
,
Wolfgang Kratzer
,
Mark Martin Haenle
,
Richard Andrew Mason
Open Journal of Clinical Diagnostics
Vol.2 No.2
,June 19, 2012
DOI:
10.4236/ojcd.2012.22006
4,272
Downloads
8,953
Views
Citations
The Design of Urban Traffic in Ferizaj through Operational Research
(Articles)
Bashkim Çerkini
,
Fakije Zejnullahu
,
Dhuratë Hyseni
Journal of Computer and Communications
Vol.8 No.12
,December 14, 2020
DOI:
10.4236/jcc.2020.812004
325
Downloads
1,210
Views
Citations
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks
(Articles)
Seo Hyun Oh
,
Chan O. Hong
,
Yoon Hwa Choi
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43012
6,685
Downloads
12,884
Views
Citations
A New Method for Sensing Cognitive Radio Network under Malicious Attacker
(Articles)
Shaahin Tabatabaee
,
Vahid Tabataba Vakili
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61007
4,451
Downloads
6,618
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,823
Downloads
3,666
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
117
Downloads
487
Views
Citations
A Modeling Framework for the Planning of Strategic Supply Chain Viewed from Complex Network
(Articles)
Jiangbo Zheng
Journal of Service Science and Management
Vol.2 No.2
,June 17, 2009
DOI:
10.4236/jssm.2009.22016
6,810
Downloads
11,783
Views
Citations
Bilateral Internal Mammary Lymph Nodes—Is Epsilateral Internal Mammary Node Treatment Sufficient?
(Articles)
Chaitali M. Waghmare
Journal of Cancer Therapy
Vol.6 No.15
,December 25, 2015
DOI:
10.4236/jct.2015.615139
4,486
Downloads
5,737
Views
Citations
Physical Layer Deterministic Network Coding Using PUM Turbo Codes over AWGN Channel, N Nodes through a Base Station Scenario
(Articles)
Hani Attar
Communications and Network
Vol.8 No.4
,November 28, 2016
DOI:
10.4236/cn.2016.84022
1,392
Downloads
2,273
Views
Citations
Clinico-Demographic Characteristics of Tuberculous Lymphadenitis: Experience of 50 Cases in Bangladesh
(Articles)
Mohammad Mahmudul Huda
,
Mohammad Taufiq
,
Md. Abdullah Yusuf
,
Mohammad Rezwanur Rahman
,
Ferdousy Begum
,
Mohammed Kamal
Journal of Tuberculosis Research
Vol.4 No.4
,December 22, 2016
DOI:
10.4236/jtr.2016.44024
1,665
Downloads
3,339
Views
Citations
Long-Term Survival after Resection for Primary Undifferentiated Pleomorphic Sarcoma of the Jejunum with Lymph Node Metastases: Case Report
(Articles)
Shigeru Fujisaki
,
Motoi Takashina
,
Kenichi Sakurai
,
Ryouichi Tomita
,
Tadatoshi Takayama
Journal of Cancer Therapy
Vol.8 No.12
,December 4, 2017
DOI:
10.4236/jct.2017.812092
842
Downloads
1,592
Views
Citations
This article belongs to the Special Issue on
Surgical Oncology
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top