Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network
(Articles)
Min-Cheol Shin
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53007
5,150
Downloads
8,929
Views
Citations
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing
(Articles)
Siti-Hajar-Aminah Ali
,
Seiichi Ozawa
,
Junji Nakazato
,
Tao Ban
,
Jumpei Shimamura
Journal of Intelligent Learning Systems and Applications
Vol.7 No.2
,April 22, 2015
DOI:
10.4236/jilsa.2015.72005
5,276
Downloads
6,686
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,185
Downloads
5,576
Views
Citations
Global Stability of SEIQRS Computer Virus Propagation Model with Non-Linear Incidence Function
(Articles)
Qaisar Badshah
Applied Mathematics
Vol.6 No.11
,October 29, 2015
DOI:
10.4236/am.2015.611170
2,440
Downloads
3,276
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,770
Downloads
2,532
Views
Citations
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
(Articles)
Carlisle Adams
Journal of Information Security
Vol.13 No.4
,October 12, 2022
DOI:
10.4236/jis.2022.134018
159
Downloads
900
Views
Citations
This article belongs to the Special Issue on
Cryptography and Network Security
Plasma Focus Studies in Serbia
(Articles)
Vladimir Udovičić
,
Nikola Veselinović
,
Dušan Joksimović
,
Radomir Banjanac
,
Dimitrije Maletić
,
Dejan Joković
,
Dragan Lukić
Journal of Modern Physics
Vol.5 No.2
,January 22, 2014
DOI:
10.4236/jmp.2014.52013
3,538
Downloads
5,635
Views
Citations
This article belongs to the Special Issue on
Fusion and Plasma Physics
On Conjugation Partitions of Sets of Trinucleotides
(Articles)
Lorenzo Bussoli
,
Christian J. Michel
,
Giuseppe Pirillo
Applied Mathematics
Vol.3 No.1
,January 4, 2012
DOI:
10.4236/am.2012.31017
5,764
Downloads
8,751
Views
Citations
Comparative Study of Different Space-Time Coding Schemes for MC-CDMA Systems
(Articles)
Lokesh Kumar Bansal
,
Aditya Trivedi
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34054
5,450
Downloads
10,206
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,041
Downloads
17,819
Views
Citations
Efficiency Improvement of Space Time Block Codes
(Articles)
Zahoor Ahmed Baloch
,
Mohammad Usman Baloch
,
Noor Hussain
Int'l J. of Communications, Network and System Sciences
Vol.3 No.6
,June 29, 2010
DOI:
10.4236/ijcns.2010.36068
5,016
Downloads
8,588
Views
Citations
Reliable Wireless Communication for Medical Devices Using Turbo Convolution Code
(Articles)
Debasish Bera
,
Tapas Chakravarty
,
Saswat Chakrabarti
Int'l J. of Communications, Network and System Sciences
Vol.3 No.8
,August 31, 2010
DOI:
10.4236/ijcns.2010.38094
5,110
Downloads
9,498
Views
Citations
Block Layering Approach in TAST Codes
(Articles)
Zahoor Ahmed
,
Jean Pierre Cances
,
Vahid Meghdadi
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310105
5,095
Downloads
8,466
Views
Citations
Simulation of small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal
(Articles)
A. H. Bekheit
Natural Science
Vol.3 No.8
,August 3, 2011
DOI:
10.4236/ns.2011.38098
7,407
Downloads
12,020
Views
Citations
Simulation of small size divertor tokamak plasma edge at low density of plasma
(Articles)
Amr Hasheim Bekheit
Natural Science
Vol.4 No.1
,December 31, 2011
DOI:
10.4236/ns.2012.41010
4,128
Downloads
7,479
Views
Citations
A Multiresolution Channel Decomposition for H.264/AVC Unequal Error Protection
(Articles)
Rachid Abbadi
,
Jamal El Abbadi
Journal of Signal and Information Processing
Vol.3 No.1
,February 28, 2012
DOI:
10.4236/jsip.2012.31001
5,409
Downloads
8,274
Views
Citations
Simulation of Radial Variation of Neutral Atoms on Edge Plasma of Small Size Divertor Tokamak
(Articles)
Amr Hasheim Bekheit
Journal of Modern Physics
Vol.3 No.2
,February 29, 2012
DOI:
10.4236/jmp.2012.32019
4,747
Downloads
8,494
Views
Citations
Time Comparing between Java and C++ Software
(Articles)
As’ad Mahmoud Alnaser
,
Omar AlHeyasat
,
Ashraf Abdel-Karim Abu-Ein
,
Hazem Hatamleh
,
Ahmed A. M. Sharadqeh
Journal of Software Engineering and Applications
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/jsea.2012.58072
12,088
Downloads
17,793
Views
Citations
Source-to-Source Translation and Software Engineering
(Articles)
David A. Plaisted
Journal of Software Engineering and Applications
Vol.6 No.4A
,April 29, 2013
DOI:
10.4236/jsea.2013.64A005
9,851
Downloads
14,184
Views
Citations
This article belongs to the Special Issue on
Software Dependability
Efficacy of Cooling Beef Taco Meat and Steamed Rice in United States School Foodservice Operations
(Articles)
David A. Olds
,
Kevin R. Roberts
,
Kevin L. Sauer
,
Jeannie Sneed
,
Carol W. Shanklin
Food and Nutrition Sciences
Vol.4 No.7
,July 5, 2013
DOI:
10.4236/fns.2013.47094
3,603
Downloads
4,979
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top