Scientific Research An Academic Publisher
OPEN ACCESS
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack (Articles)
Minmin Xie, Yong Wang, Chunming Zou, Yingjie Tian, Naiwang Guo
Journal of Computer and Communications Vol.8 No.11,November 24, 2020
DOI: 10.4236/jcc.2020.811007 71 Downloads 152 Views Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs (Articles)
Aziz Baayer, Nourddine Enneya, Mohammed Elkoutbi
Journal of Information Security Vol.3 No.3,July 25, 2012
DOI: 10.4236/jis.2012.33028 4,281 Downloads 7,484 Views Citations
Replay Attack and Defense of Electric Vehicle Charging on GB/T 27930-2015 Communication Protocol (Articles)
Yafei Li, Yong Wang, Min Wu, Haiming Li
Journal of Computer and Communications Vol.7 No.12,December 9, 2019
DOI: 10.4236/jcc.2019.712003 196 Downloads 389 Views Citations
Management of Mobile Phone Community in Jordan (Articles)
Monther Kanan, Ziad Al-Asmer
Journal of Software Engineering and Applications Vol.4 No.6,July 1, 2011
DOI: 10.4236/jsea.2011.46040 3,453 Downloads 6,468 Views Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network (Articles)
Akinjide A. Akinola, Adeyemi A. Adekoya, Ayoade O. Kuye, Abiodun Ayodeji
Journal of Information Security Vol.10 No.3,June 17, 2019
DOI: 10.4236/jis.2019.103006 446 Downloads 938 Views Citations
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack (Articles)
Hyun Woo Lee, Tae Ho Cho
Wireless Sensor Network Vol.4 No.8,August 29, 2012
DOI: 10.4236/wsn.2012.48027 4,107 Downloads 5,946 Views Citations
A Novel Solution to Handle DDOS Attack in MANET (Articles)
Meghna Chhabra, Brij Gupta, Ammar Almomani
Journal of Information Security Vol.4 No.3,July 16, 2013
DOI: 10.4236/jis.2013.43019 6,206 Downloads 10,511 Views Citations
Public Key Infrastructure: A Survey (Articles)
Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
Journal of Information Security Vol.6 No.1,January 8, 2015
DOI: 10.4236/jis.2015.61004 4,107 Downloads 6,182 Views Citations
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks (Articles)
Vennam Ratna Kumari, Aitha Nagaraju, Gaurav Pareek
Journal of Sensor Technology Vol.4 No.2,May 21, 2014
DOI: 10.4236/jst.2014.42006 3,667 Downloads 4,807 Views Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment (Articles)
Sanjeev Kumar, Orifiel Gomez
Journal of Information Security Vol.1 No.2,October 29, 2010
DOI: 10.4236/jis.2010.12010 9,405 Downloads 17,597 Views Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks (Articles)
Rodolfo Baez Junior, Sanjeev Kumar
Journal of Information Security Vol.5 No.3,July 24, 2014
DOI: 10.4236/jis.2014.53012 4,810 Downloads 6,083 Views Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods (Articles)
Arman Sargolzaei, Kang Yen, Mohamed Abdelghani, Alireza Abbaspour, Saman Sargolzaei
Intelligent Control and Automation Vol.8 No.3,August 23, 2017
DOI: 10.4236/ica.2017.83013 952 Downloads 1,778 Views Citations
Research on the Active DDoS Filtering Algorithm Based on IP Flow (Articles)
Rui GUO, Hao YIN, Dongqi WANG, Bencheng ZHANG
Int'l J. of Communications, Network and System Sciences Vol.2 No.7,October 20, 2009
DOI: 10.4236/ijcns.2009.27067 6,119 Downloads 10,634 Views Citations
Match Analysis in a University Taekwondo Championship (Articles)
Coral Falco, Raul Landeo, Cristina Menescardi, José Luis Bermejo, Isaac Estevan
Advances in Physical Education Vol.2 No.1,February 16, 2012
DOI: 10.4236/ape.2012.21005 6,321 Downloads 14,511 Views Citations
Kite Modeling for Higher Altitude Wind Energy (Articles)
Hong Zhang
Energy and Power Engineering Vol.5 No.7,September 18, 2013
DOI: 10.4236/epe.2013.57052 6,610 Downloads 9,243 Views Citations
A review on periodontitis versus endodontics (Review)
Mohammad Salarpour, Mahsa Bamadi, Elaheh Salarpour, Masood Bamadi
Health Vol.5 No.11,November 12, 2013
DOI: 10.4236/health.2013.511243 3,290 Downloads 4,584 Views Citations
A Survey of SQL Injection Attack Detection and Prevention (Articles)
Khaled Elshazly, Yasser Fouad, Mohamed Saleh, Adel Sewisy
Journal of Computer and Communications Vol.2 No.8,June 4, 2014
DOI: 10.4236/jcc.2014.28001 5,641 Downloads 9,249 Views Citations
Efficient Selfish Attack Detection in Cognitive Radio Network (Articles)
Shailaja C. Patil, Amrita Janardhanan
Wireless Engineering and Technology Vol.7 No.4,October 21, 2016
DOI: 10.4236/wet.2016.74011 1,439 Downloads 2,303 Views Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials (Articles)
Tatiana L. Ávalos-Rendón, Carlos Javier Mendoza
Materials Sciences and Applications Vol.8 No.2,February 6, 2017
DOI: 10.4236/msa.2017.82008 1,657 Downloads 2,622 Views Citations
Improvements in a Puzzle Authentication Method (Articles)
Yutaka Hirakawa, Ayaka Shimoda, Isao Sasano, Kazuo Ohzeki
Journal of Computer and Communications Vol.6 No.1,December 29, 2017
DOI: 10.4236/jcc.2018.61002 457 Downloads 881 Views Citations