Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
, December 30, 2021
DOI:
10.4236/oalib.1108000
264
Downloads
2,052
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
International Journal of Communications, Network and System Sciences
Vol.8 No.13
, December 30, 2015
DOI:
10.4236/ijcns.2015.813051
4,155
Downloads
5,590
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
, April 26, 2012
DOI:
10.4236/jis.2012.32019
6,785
Downloads
11,438
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
, December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,251
Downloads
7,390
Views
Citations
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter
(Articles)
Juuso T. Olkkonen
,
Hannu Olkkonen
Wireless Sensor Network
Vol.2 No.6
, June 24, 2010
DOI:
10.4236/wsn.2010.26057
4,880
Downloads
8,993
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yu Long
,
Yong Wang
Wireless Sensor Network
Vol.2 No.9
, September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,741
Downloads
11,048
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
, April 8, 2011
DOI:
10.4236/jis.2011.22007
8,039
Downloads
16,448
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
, July 29, 2011
DOI:
10.4236/jis.2011.23013
6,200
Downloads
12,067
Views
Citations
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
, November 16, 2011
DOI:
10.4236/cn.2011.34026
6,138
Downloads
9,485
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
, August 31, 2012
DOI:
10.4236/cn.2012.43024
4,333
Downloads
7,827
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
, March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,450
Downloads
10,356
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
, September 5, 2013
DOI:
10.4236/jis.2013.44022
4,249
Downloads
6,886
Views
Citations
Scalable Trust-Based Secure WSNs
(Articles)
Amar Agrawal
,
Ruizhong Wei
Journal of Computer and Communications
Vol.2 No.7
, May 21, 2014
DOI:
10.4236/jcc.2014.27003
3,899
Downloads
5,329
Views
Citations
Proxy Server Experiment and Network Security with Changing Nature of the Web
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
International Journal of Communications, Network and System Sciences
Vol.7 No.12
, December 4, 2014
DOI:
10.4236/ijcns.2014.712052
4,323
Downloads
6,618
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
, April 16, 2015
DOI:
10.4236/jcc.2015.34006
6,046
Downloads
8,557
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
, April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,169
Downloads
5,327
Views
Citations
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
, October 27, 2016
DOI:
10.4236/jis.2016.75025
2,541
Downloads
4,255
Views
Citations
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
(Articles)
Murat Akkaya
International Journal of Communications, Network and System Sciences
Vol.9 No.12
, December 30, 2016
DOI:
10.4236/ijcns.2016.912046
2,042
Downloads
4,181
Views
Citations
Proposal of a Methodology for the Assessment of Security Levels of IoT Wireless Sensor Networks in Nuclear Environments
(Articles)
Marcia Maria Savoine
,
Mario Olimpio de Menezes
,
Delvonei Alves de Andrade
World Journal of Nuclear Science and Technology
Vol.8 No.2
, April 11, 2018
DOI:
10.4236/wjnst.2018.82008
1,396
Downloads
3,737
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
, January 10, 2020
DOI:
10.4236/jcc.2020.81004
860
Downloads
2,193
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top