Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,323
Downloads
8,614
Views
Citations
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
8,812
Downloads
15,893
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,982
Downloads
5,326
Views
Citations
Malware Images Classification Using Convolutional Neural Network
(Articles)
Espoir K. Kabanga
,
Chang Hoon Kim
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61016
2,174
Downloads
8,710
Views
Citations
Quantifying Malware Evolution through Archaeology
(Articles)
Jeremy D. Seideman
,
Bilal Khan
,
Cesar Vargas
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62011
6,125
Downloads
7,280
Views
Citations
A Comparison of Malware Detection Techniques Based on Hidden Markov Model
(Articles)
Saja Alqurashi
,
Omar Batarfi
Journal of Information Security
Vol.7 No.3
,April 22, 2016
DOI:
10.4236/jis.2016.73017
4,741
Downloads
8,101
Views
Citations
DroidData: Tracking and Monitoring Data Transmission in the Android Operating System
(Articles)
Hani Alshahrani
,
Abdulrahman Alzahrani
,
Alexandra Hanton
,
Ali Alshehri
,
Huirong Fu
,
Ye Zhu
Communications and Network
Vol.9 No.3
,August 29, 2017
DOI:
10.4236/cn.2017.93014
1,398
Downloads
3,154
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
621
Downloads
1,951
Views
Citations
An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks
(Articles)
Moses Okechukwu Onyesolu
,
Charles Okechukwu Ugwunna
Open Access Library Journal
Vol.10 No.7
,July 31, 2023
DOI:
10.4236/oalib.1110174
35
Downloads
215
Views
Citations
Malware Analysis and Classification: A Survey
(Articles)
Ekta Gandotra
,
Divya Bansal
,
Sanjeev Sofat
Journal of Information Security
Vol.5 No.2
,April 1, 2014
DOI:
10.4236/jis.2014.52006
28,788
Downloads
51,334
Views
Citations
Study of the Security Enhancements in Various E-Mail Systems
(Articles)
Afnan S. Babrahem
,
Eman T. Alharbi
,
Aisha M. Alshiky
,
Saja S. Alqurashi
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,December 17, 2014
DOI:
10.4236/jis.2015.61001
5,015
Downloads
7,027
Views
Citations
Majority Voting Ransomware Detection System
(Articles)
Simon R. Davies
,
Richard Macfarlane
,
William J. Buchanan
Journal of Information Security
Vol.14 No.4
,August 16, 2023
DOI:
10.4236/jis.2023.144016
113
Downloads
552
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A New Model for Spreading Malware over SMS Using Network Automata
(Articles)
Erick Iván Medina-Salas
,
Ana Lilia Laureano-Cruces
,
Ma. Elena Lárraga-Ramírez
Communications and Network
Vol.15 No.4
,November 24, 2023
DOI:
10.4236/cn.2023.154008
146
Downloads
736
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
114
Downloads
470
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,882
Downloads
5,111
Views
Citations
Captcha-Based Honey Net Model against Malicious Codes
(Articles)
Adeniyi Akanni
,
Williams Akanni
,
Oluwafunmilasyo Helen Daso
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113012
67
Downloads
510
Views
Citations
Research on New English Mobile Teaching Mode under the Impact of Mobile Internet Age
(Articles)
Dan Xu
Open Journal of Social Sciences
Vol.7 No.5
,May 13, 2019
DOI:
10.4236/jss.2019.75008
1,081
Downloads
2,435
Views
Citations
Application of Mobile Learning System in Operating System Course
(Articles)
Lingling Guo
,
Yu Fu
,
Xiaozhe Yin
,
Man Yuan
,
Fangzhou Zhang
,
Juntao Gao
Communications and Network
Vol.5 No.2
,May 10, 2013
DOI:
10.4236/cn.2013.52017
4,629
Downloads
8,213
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
15,903
Downloads
44,325
Views
Citations
The Effect of Online-to-Mobile Trust Transfer on the Foundation of Mobile Banking Trust
(Articles)
Bangjun Wang
,
Chu Shan
Communications and Network
Vol.5 No.1B
,May 12, 2014
DOI:
10.4236/cn.2013.51B025
4,776
Downloads
6,240
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top