Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
QoS-Guaranteed Secure Multicast Routing Protocol for Satellite IP Networks Using Hierarchical Architecture
(Articles)
Zhizhong Yin
,
Long Zhang
,
Xianwei Zhou
,
Peng Xu
,
Yu Deng
Int'l J. of Communications, Network and System Sciences
Vol.3 No.4
,April 30, 2010
DOI:
10.4236/ijcns.2010.34045
5,562
Downloads
10,685
Views
Citations
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter
(Articles)
Juuso T. Olkkonen
,
Hannu Olkkonen
Wireless Sensor Network
Vol.2 No.6
,June 24, 2010
DOI:
10.4236/wsn.2010.26057
4,596
Downloads
8,356
Views
Citations
Hybrid Security Techniques for Internet of Things Healthcare Applications
(Articles)
Lobna Yehia
,
Ayman Khedr
,
Ashraf Darwish
Advances in Internet of Things
Vol.5 No.3
,July 30, 2015
DOI:
10.4236/ait.2015.53004
7,091
Downloads
10,198
Views
Citations
Comparative Analysis of Wireless Security Protocols: WEP vs WPA
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.12
,December 17, 2015
DOI:
10.4236/ijcns.2015.812043
8,739
Downloads
12,656
Views
Citations
This article belongs to the Special Issue on
Big Data and Cloud Computing Challenges
A Novel Review on Security and Routing Protocols in MANET
(Articles)
Muhammad Kashif Nazir
,
Rameez U. Rehman
,
Atif Nazir
Communications and Network
Vol.8 No.4
,September 22, 2016
DOI:
10.4236/cn.2016.84020
2,292
Downloads
5,501
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,239
Downloads
6,067
Views
Citations
Security Implications of Edge Computing in Cloud Networks
(Articles)
Sina Ahmadi
Journal of Computer and Communications
Vol.12 No.2
,February 9, 2024
DOI:
10.4236/jcc.2024.122003
210
Downloads
986
Views
Citations
Occupation, Physical Fitness and Adiposity Markers among Security Guards and Students of Delhi University
(Articles)
Imkongtenla Pongen
,
Shumayla
,
Meenal Dhall
,
Satwanti Kapoor
Health
Vol.8 No.10
,July 22, 2016
DOI:
10.4236/health.2016.810101
1,735
Downloads
2,967
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
522
Downloads
4,295
Views
Citations
A Systematic Approach for Cyber Security in Vehicular Networks
(Articles)
Farhan Ahmad
,
Asma Adnane
,
Virginia N. L. Franqueira
Journal of Computer and Communications
Vol.4 No.16
,December 29, 2016
DOI:
10.4236/jcc.2016.416004
2,134
Downloads
5,751
Views
Citations
This article belongs to the Special Issue on
Vehicular Communications and Networks
Examining Relations of Aggressive Communication in Social Networks
(Articles)
Alexandra Bekiari
,
Stergiani Deliligka
,
Athanasios Koustelios
Social Networking
Vol.6 No.1
,December 30, 2016
DOI:
10.4236/sn.2017.61003
1,606
Downloads
3,964
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,055
Downloads
6,682
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,860
Downloads
8,369
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,531
Downloads
3,058
Views
Citations
Performance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE 802.11e Mobile Ad Hoc Networks
(Articles)
Hang SHEN
,
Guangwei BAI
,
Junyuan WANG
,
Yong JIN
,
Jinjing TAO
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14041
7,787
Downloads
12,962
Views
Citations
Effect of Transmission Control Protocol on Limited Buffer Cognitive Radio Relay Node
(Articles)
Mohsen M. Tantawy
Communications and Network
Vol.7 No.3
,July 24, 2015
DOI:
10.4236/cn.2015.73013
4,534
Downloads
5,305
Views
Citations
Biological Inspiration—Theoretical Framework Mitosis Artificial Neural Networks Unsupervised Algorithm
(Articles)
Lácides Pinto Mindiola
,
Gelvis Melo Freile
,
Carlos Socarras Bertiz
Int'l J. of Communications, Network and System Sciences
Vol.8 No.9
,September 30, 2015
DOI:
10.4236/ijcns.2015.89036
5,606
Downloads
6,833
Views
Citations
Energy Efficient and QoS Aware Framework for Video Transmission over Wireless Sensor Networks
(Articles)
Mohammed Ezz El Dien
,
Aliaa A. A. Youssif
,
Atef Zaki Ghalwash
Wireless Sensor Network
Vol.8 No.3
,March 3, 2016
DOI:
10.4236/wsn.2016.83003
4,205
Downloads
5,633
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,514
Downloads
9,747
Views
Citations
Does Reactive Adaptation Exist? Using the Ecosystem Service Governance Approach to Evaluate Post-Drought Rural Food Security in Kenya
(Articles)
Grace W. Ngaruiya
Natural Resources
Vol.5 No.8
,June 24, 2014
DOI:
10.4236/nr.2014.58037
3,920
Downloads
5,214
Views
Citations
This article belongs to the Special Issue on
Resource Security
<
...
5
6
7
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top