Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
TCP Window Based Congestion Control -Slow-Start Approach
(Articles)
Kolawole I. Oyeyinka
,
Ayodeji O. Oluwatope
,
Adio. T. Akinwale
,
Olusegun Folorunso
,
Ganiyu A. Aderounmu
,
Olatunde O. Abiona
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32011
8,756
Downloads
17,362
Views
Citations
Buffer Occupancy of Double-Buffer Traffic Shaper in Real-Time Multimedia Applications across Slow-Speed Links
(Articles)
Ayodeji O. Oluwatope
,
Damilola T. Oyewo
,
Folake E. Olayiwola
,
Ganiyu A. Aderounmu
,
Emmanuel A. Adagunodo
Communications and Network
Vol.5 No.1
,February 27, 2013
DOI:
10.4236/cn.2013.51008
4,175
Downloads
6,902
Views
Citations
Comparative Analysis of TCP-Protocol Operation Algorithms in Self-Similar Traffic
(Articles)
Abed Saif Alghawli
Communications and Network
Vol.5 No.2
,May 10, 2013
DOI:
10.4236/cn.2013.52016
5,887
Downloads
8,284
Views
Citations
Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes
(Articles)
Ahmed Refaey
,
Weikun Hou
,
Khaled Loukhaoukha
Journal of Computer and Communications
Vol.2 No.8
,June 26, 2014
DOI:
10.4236/jcc.2014.28007
2,505
Downloads
3,621
Views
Citations
On the Nonequilibrium of Radiation-Induced Bystander Effects in Tumor Surface and Its Implications in Radiation Therapy
(Articles)
R. Vaitheeswaran
,
K. J. Maria Das
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.4 No.3
,July 22, 2015
DOI:
10.4236/ijmpcero.2015.43025
2,690
Downloads
3,445
Views
Citations
Delay Resistant Transport Protocol for Deep Space Communication
(Articles)
Mohanchur Sarkar
,
Kaushal K. Shukla
,
Kankar S. Dasgupta
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42015
4,915
Downloads
9,568
Views
Citations
The Emergence of “Syn-Epistemic Wholeness” from Dialectic Synergy of Disciplines: A Transdisciplinary Social Pedagogic Model
(Articles)
Iro Mylonakou-Keke
Creative Education
Vol.6 No.17
,October 27, 2015
DOI:
10.4236/ce.2015.617195
3,027
Downloads
4,340
Views
Citations
This article belongs to the Special Issue on
Interdisciplinarity in Education
Catalyst Free One-Pot Synthesis of Chromeno Quinolines and Their Antibacterial Activity
(Articles)
Sruthi Vasamsetty
,
Sunitha Medidi
,
Satheesh Ampolu
,
Ravi Kumar Majji
,
Mastan Rao Kotupalli
,
Chikurumilli China Satyanarayana
,
Annapurna Nowduri
,
Paul Douglas Sanasi
Green and Sustainable Chemistry
Vol.7 No.2
,May 22, 2017
DOI:
10.4236/gsc.2017.72011
1,596
Downloads
2,893
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,201
Downloads
6,882
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,298
Downloads
2,734
Views
Citations
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
(Articles)
Sharmila Bista
,
Roshan Chitrakar
Journal of Information Security
Vol.9 No.1
,December 20, 2017
DOI:
10.4236/jis.2018.91004
1,593
Downloads
3,872
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,379
Downloads
6,963
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.4
,August 16, 2018
DOI:
10.4236/jis.2018.94016
3,741
Downloads
8,889
Views
Citations
Match Analysis in a University Taekwondo Championship
(Articles)
Coral Falco
,
Raul Landeo
,
Cristina Menescardi
,
José Luis Bermejo
,
Isaac Estevan
Advances in Physical Education
Vol.2 No.1
,February 16, 2012
DOI:
10.4236/ape.2012.21005
7,427
Downloads
16,325
Views
Citations
Kite Modeling for Higher Altitude Wind Energy
(Articles)
Hong Zhang
Energy and Power Engineering
Vol.5 No.7
,September 18, 2013
DOI:
10.4236/epe.2013.57052
7,798
Downloads
11,006
Views
Citations
A review on periodontitis versus endodontics
(Review)
Mohammad Salarpour
,
Mahsa Bamadi
,
Elaheh Salarpour
,
Masood Bamadi
Health
Vol.5 No.11
,November 12, 2013
DOI:
10.4236/health.2013.511243
3,615
Downloads
5,202
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,218
Downloads
12,114
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,723
Downloads
3,064
Views
Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials
(Articles)
Tatiana L. Ávalos-Rendón
,
Carlos Javier Mendoza
Materials Sciences and Applications
Vol.8 No.2
,February 6, 2017
DOI:
10.4236/msa.2017.82008
1,994
Downloads
3,721
Views
Citations
Improvements in a Puzzle Authentication Method
(Articles)
Yutaka Hirakawa
,
Ayaka Shimoda
,
Isao Sasano
,
Kazuo Ohzeki
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61002
708
Downloads
1,764
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top