Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,843
Downloads
8,674
Views
Citations
Network Access Control Technology—Proposition to Contain New Security Challenges
(Articles)
Abdelmajid Lakbabi
,
Ghizlane Orhanou
,
Said El Hajji
Int'l J. of Communications, Network and System Sciences
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/ijcns.2012.58061
6,700
Downloads
11,059
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,750
Downloads
8,537
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Reduction of the Beam Hardening Artifacts in the X-Ray Computer Tomography: Energy Discrimination with a Photon-Counting Detector
(Articles)
Yukino Imura
,
Takuto Yanagida
,
Hisashi Morii
,
Hidenori Mimura
,
Toru Aoki
World Journal of Nuclear Science and Technology
Vol.2 No.4
,October 31, 2012
DOI:
10.4236/wjnst.2012.24026
7,507
Downloads
10,934
Views
Citations
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
(Articles)
Moad Mowafi
,
Lo'ai Tawalbeh
,
Walid Aljoby
,
Mohammad Al-Rousan
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34034
4,033
Downloads
7,247
Views
Citations
Towards a Comprehensive Security Framework of Cloud Data Storage Based on Multi Agent System Architecture
(Articles)
Amir Mohamed Talib
,
Rodziah Atan
,
Rusli Abdullah
,
Masrah Azrifah Azmi Murad
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34036
6,684
Downloads
11,872
Views
Citations
A Quick Method for Judging the Feasibility of Security-Constrained Unit Commitment Problems within Lagrangian Relaxation Framework
(Articles)
Sangang Guo
Energy and Power Engineering
Vol.4 No.6
,November 29, 2012
DOI:
10.4236/epe.2012.46057
5,275
Downloads
7,561
Views
Citations
Trust and Security on Semantic HIM (Health Information Management)
(Articles)
Nasim Khozouei
,
Razie Vanda
,
Peyman Khozouei
Intelligent Information Management
Vol.4 No.6
,November 30, 2012
DOI:
10.4236/iim.2012.46045
4,422
Downloads
7,261
Views
Citations
Detection of Influenza Viruses Attached to an Optical Disk
(Articles)
Takayuki Shima
,
Makoto Fujimaki
,
Akihiro Yoshida
,
Subash C. B. Gopinath
,
Masashi Kuwahara
,
Yoshimichi Ohki
,
Koichi Awazu
Journal of Biomaterials and Nanobiotechnology
Vol.4 No.2
,April 17, 2013
DOI:
10.4236/jbnb.2013.42020
4,112
Downloads
5,928
Views
Citations
Features of Virus Detection Mechanism in Microsoft Security Essentials (Microsoft Forefront Endpoint Protection)
(Articles)
Dmitry Silnov
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42014
5,141
Downloads
8,485
Views
Citations
Quantitative Security Evaluation for Software System from Vulnerability Database
(Articles)
Hiroyuki Okamura
,
Masataka Tokuzane
,
Tadashi Dohi
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 23, 2013
DOI:
10.4236/jsea.2013.64A003
4,391
Downloads
6,973
Views
Citations
This article belongs to the Special Issue on
Software Dependability
Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images
(Articles)
Yanping Zhang
,
Juan Jiang
,
Yongliang Zha
,
Heng Zhang
,
Shu Zhao
International Journal of Intelligence Science
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ijis.2013.32009
8,296
Downloads
15,442
Views
Citations
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43016
4,558
Downloads
8,025
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
10,289
Downloads
19,344
Views
Citations
Engaged Learning and Change through Undergraduate Research: A Case Study of the Heart of Gold Community Empowerment Project
(Articles)
David William Robinson
,
J. Laureen Styles
,
Nichola Evernden
,
Kassandra Kirkham
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2013
3,920
Downloads
5,765
Views
Citations
This article belongs to the Special Issue on
Higher Education
An Inquiry into the Effectiveness of Student Generated MCQs as a Method of Assessment to Improve Teaching and Learning
(Articles)
Damien Hutchinson
,
Jason Wells
Creative Education
Vol.4 No.7B
,July 18, 2013
DOI:
10.4236/ce.2013.47A2014
6,293
Downloads
9,902
Views
Citations
This article belongs to the Special Issue on
Higher Education
Three-defense Line Coordination Strategy of the Guizhou Power Grid with the New Security Situation
(Articles)
Wencheng Zheng
,
Tao Yu
Energy and Power Engineering
Vol.5 No.3B
,July 31, 2013
DOI:
10.4236/epe.2013.53B008
4,452
Downloads
5,419
Views
Citations
Security Regulations in Mexican Renewable Energies: Case of Geothermal Projects
(Articles)
Alfonso Aragón-Aguilar
,
Georgina Izquierdo-Montalvo
,
Víctor Arellano-Gómez
Smart Grid and Renewable Energy
Vol.4 No.6A
,September 3, 2013
DOI:
10.4236/sgre.2013.46A003
31,106
Downloads
39,546
Views
Citations
This article belongs to the Special Issue on
Smart Grid Security
Computer Assisted Alerts Using Mental Model Approach for Customer Service Improvement
(Articles)
Abid Ghaffar
,
Mohamed Ridza Wahiddin
,
Asadullah Shaikh
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B005
3,672
Downloads
5,257
Views
Citations
Integrated Water Resources Management (IWRM) Impacts in South West Coastal Zone of Bangladesh and Fact-Finding on Tidal River Management (TRM)
(Articles)
Fahad Khan Khadim
,
Kanak Kanti Kar
,
Pronab Kumar Halder
,
Md. Atiqur Rahman
,
A.K.M. Mostafa Morshed
Journal of Water Resource and Protection
Vol.5 No.10
,October 21, 2013
DOI:
10.4236/jwarp.2013.510098
5,779
Downloads
12,185
Views
Citations
<
...
25
26
27
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top