Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology
(Articles)
Heping Pu
,
Yijun Wang
,
Xinke An
Journal of Computer and Communications
Vol.8 No.8
, August 28, 2020
DOI:
10.4236/jcc.2020.88005
705
Downloads
2,023
Views
Citations
Feasibility and Challenges of 5G Network Deployment in Least Developed Countries (LDC)
(Articles)
Ashikur Rahman
,
Salsabil Arabi
,
Raqeebir Rab
Wireless Sensor Network
Vol.13 No.1
, January 29, 2021
DOI:
10.4236/wsn.2021.131001
1,519
Downloads
9,023
Views
Citations
Inmap-t
: Leveraging TTCN-3 to Test the Security Impact of Intra Network Elements
(Articles)
Antonino Vitale
,
Marc Dacier
Journal of Computer and Communications
Vol.9 No.6
, June 29, 2021
DOI:
10.4236/jcc.2021.96010
362
Downloads
1,347
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
International Journal of Communications, Network and System Sciences
Vol.16 No.8
, August 17, 2023
DOI:
10.4236/ijcns.2023.168012
326
Downloads
1,463
Views
Citations
Forecasting Cereal Production and Its Implications for Food Security in Somalia: A Comparative Analysis of ARIMA, ETS, and Neural Network Models
(Articles)
Abdisalam Ahmed
,
Mohamed Sheikh Abdisamad
,
Mahamed Mahamed
,
Abdisalam Hassan
Agricultural Sciences
Vol.17 No.2
, February 28, 2026
DOI:
10.4236/as.2026.172009
117
Downloads
874
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
, October 7, 2013
DOI:
10.4236/cn.2013.53B2104
3,056
Downloads
5,101
Views
Citations
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
, July 7, 2016
DOI:
10.4236/jis.2016.74018
3,065
Downloads
6,358
Views
Citations
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
(Articles)
Linli Wang
,
Hu Wang
,
Hanlu Lei
Journal of Computer and Communications
Vol.11 No.5
, May 31, 2023
DOI:
10.4236/jcc.2023.115014
298
Downloads
1,140
Views
Citations
The Online Assessment of Electric Distribution Network Load Capability
(Articles)
Haoming Liu
,
Zhenkun Li
,
Kun Yu
,
Xingying Chen
Journal of Electromagnetic Analysis and Applications
Vol.1 No.1
, March 12, 2009
DOI:
10.4236/jemaa.2009.11008
5,716
Downloads
10,641
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
, May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,847
Downloads
10,479
Views
Citations
Potential Vulnerability of Encrypted Messages: Decomposability of Discrete Logarithm Problems
(Articles)
Boris S. Verkhovsky
International Journal of Communications, Network and System Sciences
Vol.3 No.8
, August 31, 2010
DOI:
10.4236/ijcns.2010.38086
5,395
Downloads
9,067
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21003
10,528
Downloads
24,295
Views
Citations
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
, July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,741
Downloads
20,894
Views
Citations
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
International Journal of Communications, Network and System Sciences
Vol.4 No.8
, August 19, 2011
DOI:
10.4236/ijcns.2011.48064
6,285
Downloads
11,687
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
, July 25, 2012
DOI:
10.4236/jis.2012.33027
5,560
Downloads
9,122
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
, July 25, 2012
DOI:
10.4236/jis.2012.33028
5,113
Downloads
9,026
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
International Journal of Communications, Network and System Sciences
Vol.5 No.9A
, September 18, 2012
DOI:
10.4236/ijcns.2012.529069
5,157
Downloads
9,242
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
, July 12, 2013
DOI:
10.4236/jis.2013.43016
4,820
Downloads
8,608
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
, July 12, 2013
DOI:
10.4236/jis.2013.43017
11,952
Downloads
19,761
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
, May 8, 2015
DOI:
10.4236/jdaip.2015.32002
5,089
Downloads
6,538
Views
Citations
First
<
...
2
3
4
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top