Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN
(Articles)
Shaik Sahil Babu
,
Arnab Raha
,
Mrinal Kanti Naskar
Wireless Sensor Network
Vol.6 No.8
,August 22, 2014
DOI:
10.4236/wsn.2014.68016
5,350
Downloads
7,554
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
816
Downloads
5,222
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
,April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,051
Downloads
10,804
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
,August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,455
Downloads
14,692
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411084
4,771
Downloads
8,548
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.6 No.10
,October 25, 2013
DOI:
10.4236/ijcns.2013.610046
4,674
Downloads
7,629
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,681
Downloads
6,469
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
622
Downloads
1,962
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
69
Downloads
409
Views
Citations
Network Construction Food Security of Local Fishing Community in Thailand
(Articles)
Supanut Subnawin
,
Anurak Singchai
Open Journal of Social Sciences
Vol.12 No.2
,February 28, 2024
DOI:
10.4236/jss.2024.122026
38
Downloads
125
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21002
6,589
Downloads
12,269
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,204
Downloads
15,572
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44017
8,937
Downloads
16,142
Views
Citations
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
(Articles)
Bei Liu
,
Yuanming Wu
Wireless Sensor Network
Vol.7 No.11
,November 11, 2015
DOI:
10.4236/wsn.2015.711012
7,946
Downloads
10,487
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
971
Downloads
2,234
Views
Citations
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
168
Downloads
1,373
Views
Citations
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,934
Downloads
4,994
Views
Citations
Network Coding and Quality of Service for Mobile
Ad Hoc
Networks
(Articles)
Michael Hay
,
Basil Saeed
,
Chung-Horng Lung
,
Thomas Kunz
,
Anand Srinivasan
Int'l J. of Communications, Network and System Sciences
Vol.7 No.10
,October 16, 2014
DOI:
10.4236/ijcns.2014.710042
3,148
Downloads
3,912
Views
Citations
Automatic Alzheimer’s Disease Recognition from MRI Data Using Deep Learning Method
(Articles)
Suhuai Luo
,
Xuechen Li
,
Jiaming Li
Journal of Applied Mathematics and Physics
Vol.5 No.9
,October 16, 2017
DOI:
10.4236/jamp.2017.59159
2,103
Downloads
6,909
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,434
Downloads
11,164
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top