Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,517
Downloads
4,308
Views
Citations
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
(Articles)
Sharmila Bista
,
Roshan Chitrakar
Journal of Information Security
Vol.9 No.1
,December 20, 2017
DOI:
10.4236/jis.2018.91004
1,588
Downloads
4,212
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,375
Downloads
7,264
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.4
,August 16, 2018
DOI:
10.4236/jis.2018.94016
3,728
Downloads
9,465
Views
Citations
Match Analysis in a University Taekwondo Championship
(Articles)
Coral Falco
,
Raul Landeo
,
Cristina Menescardi
,
José Luis Bermejo
,
Isaac Estevan
Advances in Physical Education
Vol.2 No.1
,February 16, 2012
DOI:
10.4236/ape.2012.21005
7,410
Downloads
17,013
Views
Citations
Kite Modeling for Higher Altitude Wind Energy
(Articles)
Hong Zhang
Energy and Power Engineering
Vol.5 No.7
,September 18, 2013
DOI:
10.4236/epe.2013.57052
7,791
Downloads
11,829
Views
Citations
A review on periodontitis versus endodontics
(Review)
Mohammad Salarpour
,
Mahsa Bamadi
,
Elaheh Salarpour
,
Masood Bamadi
Health
Vol.5 No.11
,November 12, 2013
DOI:
10.4236/health.2013.511243
3,609
Downloads
5,300
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,203
Downloads
13,242
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,720
Downloads
3,139
Views
Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials
(Articles)
Tatiana L. Ávalos-Rendón
,
Carlos Javier Mendoza
Materials Sciences and Applications
Vol.8 No.2
,February 6, 2017
DOI:
10.4236/msa.2017.82008
1,991
Downloads
3,848
Views
Citations
Improvements in a Puzzle Authentication Method
(Articles)
Yutaka Hirakawa
,
Ayaka Shimoda
,
Isao Sasano
,
Kazuo Ohzeki
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61002
701
Downloads
1,844
Views
Citations
Posttraumatic Stress Disorder Mediated by Exposure Level in French Civil Firefighters Following a Terrorist Attack: Some Hypotheses towards a Structural Model
(Articles)
Angelika Wolman
,
Jean-Marie Stève
,
Marion Samor
,
Evelyne Bouteyre
,
Themistoklis Apostolidis
,
Abdessadek El Ahmadi
World Journal of Neuroscience
Vol.10 No.3
,August 6, 2020
DOI:
10.4236/wjns.2020.103014
463
Downloads
1,213
Views
Citations
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
(Articles)
Suhail Qadir
,
Uzair Bashir
Journal of Information Security
Vol.13 No.2
,April 11, 2022
DOI:
10.4236/jis.2022.132004
322
Downloads
1,539
Views
Citations
Generalized Anxiety Disorder: A Review of Current Literature in Saudi Arabia
(Articles)
Omar Abdulqader Bamalan
,
Nader Mohammed Alosaimi
,
Abdulrahman Abdulrazzaq Alfryyan
,
Hussain Jawad Aljubran
,
Faris Hamoud Alanazi
,
Zaheenul Islam Siddiqui
Psychology
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/psych.2023.141003
265
Downloads
2,355
Views
Citations
This article belongs to the Special Issue on
Depression and Anxiety
COVID-19 and Cardiovascular Disease—Two Pandemics, One Success
(Articles)
Robert Philip Eaton
,
Barry Ramo
,
Martin Hickey
,
David S. Schade
World Journal of Cardiovascular Diseases
Vol.13 No.4
,April 28, 2023
DOI:
10.4236/wjcd.2023.134021
73
Downloads
417
Views
Citations
Anesthetic and Obstetric Considerations of Moyamoya Disease in Pregnancy after Intracranial Bypass Grafting: A Case Report and Literature Review
(Case Report)
Dennerd Ovando Jr.
,
Arit Ntekim
,
Ming Xiong
Open Journal of Anesthesiology
Vol.13 No.5
,May 15, 2023
DOI:
10.4236/ojanes.2023.135010
69
Downloads
555
Views
Citations
Studies on Chemical Resistance of PET-Mortar Composites: Microstructure and Phase Composition Changes
(Articles)
Ahmed Soufiane Benosman
,
Mohamed Mouli
,
Hamed Taibi
,
Mohamed Belbachir
,
Yassine Senhadji
,
Ilies Bahlouli
,
David Houivet
Engineering
Vol.5 No.4
,April 29, 2013
DOI:
10.4236/eng.2013.54049
7,275
Downloads
11,355
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,503
Downloads
5,111
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,667
Downloads
9,125
Views
Citations
Classification Approach for Intrusion Detection in Vehicle Systems
(Articles)
Abdulaziz Alshammari
,
Mohamed A. Zohdy
,
Debatosh Debnath
,
George Corser
Wireless Engineering and Technology
Vol.9 No.4
,October 31, 2018
DOI:
10.4236/wet.2018.94007
2,505
Downloads
6,647
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top