Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Secure Communications for Two-Way Relay Networks Via Relay Chatting
(Articles)
Jun Xiong
,
Dongtang Ma
,
Chunguo Liu
,
Xin Wang
Communications and Network
Vol.5 No.3C
,November 7, 2013
DOI:
10.4236/cn.2013.53B2009
2,539
Downloads
4,010
Views
Citations
A Resource Allocation Algorithm of Physical-Layer Security for OFDMA System under Non-ideal Condition
(Articles)
Xiao-min Ran
,
You-quan Mo
,
Yu-lei Chen
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2039
5,665
Downloads
6,932
Views
Citations
Artificial Noise Based Security Algorithm for Multi-User MIMO System
(Articles)
Jian-hua Peng
,
Kai-zhi Huang
,
Jiang Ji
Communications and Network
Vol.5 No.3C
,November 8, 2013
DOI:
10.4236/cn.2013.53B2037
5,848
Downloads
7,610
Views
Citations
Research on Physical Layer Security in Cognitive Wireless Networks with Multiple Eavesdroppers Based on Resource Allocation Algorithm
(Articles)
Yuxin Du
,
Xiaoli He
,
Yongming Huang
Journal of Computer and Communications
Vol.11 No.3
,March 29, 2023
DOI:
10.4236/jcc.2023.113004
66
Downloads
370
Views
Citations
Cross-Layer Energy Analysis and Proposal of a MAC Protocol for Wireless Sensor Networks Dedicated to Building Monitoring Systems
(Articles)
Denis Dessales
,
Noël Richard
,
Anne-Marie Poussard
,
Rodolphe Vauzelle
,
Christophe Martinsons
Wireless Sensor Network
Vol.5 No.5
,May 24, 2013
DOI:
10.4236/wsn.2013.55012
4,465
Downloads
7,577
Views
Citations
Association between the Performance of the University Security Officers and Their Physical Fitness: A Case Study
(Articles)
A. M. Razmy
,
A. Jabeer
Open Access Library Journal
Vol.4 No.6
,June 12, 2017
DOI:
10.4236/oalib.1103239
1,066
Downloads
1,980
Views
Citations
On the Development of Realistic Cross Layer Communication Protocol for Wireless Sensor Networks
(Articles)
Shalli Rani
,
Jyoteesh Malhotra
,
Rajneesh Talwar
Wireless Sensor Network
Vol.6 No.5
,May 29, 2014
DOI:
10.4236/wsn.2014.65008
3,597
Downloads
5,268
Views
Citations
Location Based Performance of WiMAX Network for QoS with Optimal Base Stations (BS)
(Articles)
Rakesh Kumar Jha
,
Bholebawa Idris Z
,
Upena D Dalal
Wireless Engineering and Technology
Vol.2 No.3
,July 6, 2011
DOI:
10.4236/wet.2011.23020
6,855
Downloads
13,763
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
13,727
Downloads
31,738
Views
Citations
Security and Privacy Challenges in Cyber-Physical Systems
(Articles)
Fahd AlDosari
Journal of Information Security
Vol.8 No.4
,October 13, 2017
DOI:
10.4236/jis.2017.84019
2,311
Downloads
7,329
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,672
Downloads
15,947
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,029
Downloads
6,378
Views
Citations
Automatic Detection of Optical “Faults” in Communications Networks
(Articles)
Meir Bartur
Optics and Photonics Journal
Vol.3 No.2B
,July 22, 2013
DOI:
10.4236/opj.2013.32B043
3,557
Downloads
4,952
Views
Citations
Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes
(Articles)
Ahmed Refaey
,
Weikun Hou
,
Khaled Loukhaoukha
Journal of Computer and Communications
Vol.2 No.8
,June 26, 2014
DOI:
10.4236/jcc.2014.28007
2,491
Downloads
3,733
Views
Citations
Physical Alloying of Plasma Metallization Carbide Nanocomposite Coating by Allotropic Carbon Nanostructures
(Articles)
Philipp I. Vysikaylo
,
Valeriy S. Mitin
,
Alexey A. Yakushkin
J. of Surface Engineered Materials and Advanced Technology
Vol.11 No.1
,January 29, 2021
DOI:
10.4236/jsemat.2021.111001
310
Downloads
911
Views
Citations
Occupation, Physical Fitness and Adiposity Markers among Security Guards and Students of Delhi University
(Articles)
Imkongtenla Pongen
,
Shumayla
,
Meenal Dhall
,
Satwanti Kapoor
Health
Vol.8 No.10
,July 22, 2016
DOI:
10.4236/health.2016.810101
1,702
Downloads
3,069
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
488
Downloads
4,309
Views
Citations
A Cross-Layer Optimization Framework for Energy Efficiency in Wireless Sensor Networks
(Articles)
Karuna Babber
,
Rajneesh Randhawa
Wireless Sensor Network
Vol.9 No.6
,June 28, 2017
DOI:
10.4236/wsn.2017.96011
1,939
Downloads
4,253
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,042
Downloads
6,847
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,849
Downloads
8,683
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top