Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
, July 29, 2011
DOI:
10.4236/jis.2011.23012
7,985
Downloads
14,139
Views
Citations
IoT Security System Based on Software Defined Network with Manufacturer Usage Description
(Articles)
Takuma Sakamoto
,
Kenya Sato
Communications and Network
Vol.18 No.1
, December 10, 2025
DOI:
10.4236/cn.2026.181001
71
Downloads
433
Views
Citations
Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks
(Articles)
Hangxia Zhou
,
Qian Liu
,
Chen Cui
Communications and Network
Vol.5 No.3C
, October 7, 2013
DOI:
10.4236/cn.2013.53B2096
3,276
Downloads
5,467
Views
Citations
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN
(Articles)
Shaik Sahil Babu
,
Arnab Raha
,
Mrinal Kanti Naskar
Wireless Sensor Network
Vol.6 No.8
, August 22, 2014
DOI:
10.4236/wsn.2014.68016
5,703
Downloads
7,445
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
, March 28, 2018
DOI:
10.4236/jcc.2018.63010
1,011
Downloads
6,107
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
, April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,398
Downloads
11,473
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
, August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,980
Downloads
15,477
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
International Journal of Communications, Network and System Sciences
Vol.4 No.11
, October 31, 2011
DOI:
10.4236/ijcns.2011.411084
5,051
Downloads
9,079
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
International Journal of Communications, Network and System Sciences
Vol.6 No.10
, October 25, 2013
DOI:
10.4236/ijcns.2013.610046
5,029
Downloads
8,254
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
, March 12, 2014
DOI:
10.4236/jis.2014.52004
4,924
Downloads
6,982
Views
Citations
Encrypted CDMA Audio Network
(Articles)
Alfredo A. Ortega
,
Víctor A. Bettachini
,
Pablo I. Fierens
,
José Ignacio Alvarez-Hamelin
Journal of Information Security
Vol.5 No.3
, June 25, 2014
DOI:
10.4236/jis.2014.53008
3,353
Downloads
5,215
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.14 No.4
, April 30, 2021
DOI:
10.4236/ijcns.2021.144004
1,403
Downloads
3,271
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
, May 26, 2023
DOI:
10.4236/jcc.2023.115009
550
Downloads
1,692
Views
Citations
Network Construction Food Security of Local Fishing Community in Thailand
(Articles)
Supanut Subnawin
,
Anurak Singchai
Open Journal of Social Sciences
Vol.12 No.2
, February 28, 2024
DOI:
10.4236/jss.2024.122026
211
Downloads
715
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21002
7,041
Downloads
12,996
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21004
7,633
Downloads
16,595
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
, April 24, 2012
DOI:
10.4236/wsn.2012.44017
9,188
Downloads
16,803
Views
Citations
Research on Application of Mobile Agent Based on Immune Algorithms in Ad Hoc Network
(Articles)
Qinggong Ma
,
Bo Yang
Journal of Computer and Communications
Vol.3 No.10
, October 29, 2015
DOI:
10.4236/jcc.2015.310004
2,158
Downloads
3,041
Views
Citations
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
(Articles)
Bei Liu
,
Yuanming Wu
Wireless Sensor Network
Vol.7 No.11
, November 11, 2015
DOI:
10.4236/wsn.2015.711012
8,121
Downloads
10,935
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
, January 23, 2018
DOI:
10.4236/jis.2018.91007
1,195
Downloads
2,777
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top