Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Role of AI in Cyber Security: Safeguarding Digital Identity
(Articles)
Mohammad Binhammad
,
Shaikha Alqaydi
,
Azzam Othman
,
Laila Hatim Abuljadayel
Journal of Information Security
Vol.15 No.2
,April 30, 2024
DOI:
10.4236/jis.2024.152015
64
Downloads
608
Views
Citations
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
(Articles)
Yu ZHANG
,
Xing She ZHOU
,
Yi Ming JI
,
Yee Wei LAW
,
Marimuthu PALANISWAMI
Int'l J. of Communications, Network and System Sciences
Vol.2 No.1
,February 26, 2009
DOI:
10.4236/ijcns.2009.21008
7,184
Downloads
15,173
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,686
Downloads
15,984
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23013
5,809
Downloads
11,378
Views
Citations
Evaluation of Electrocardiogram for Biometric Authentication
(Articles)
Yogendra Narain Singh
,
S K Singh
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31005
24,450
Downloads
36,467
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,882
Downloads
9,233
Views
Citations
Calcium Affects on Vascular Endpoints (CAVE) Retrospective Cohort Trial
(Articles)
Rajib K. Bhattacharya
,
Vaishali B. Patel
,
James L. Vacek
Open Journal of Endocrine and Metabolic Diseases
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/ojemd.2013.31012
3,400
Downloads
5,918
Views
Citations
Integrate Liveness Detection with Iris Verification to Construct Support Biometric System
(Articles)
Hanaa Mohsin Ahmad
,
Bushra Jabbar Abdulkareem
Journal of Computer and Communications
Vol.4 No.1
,January 26, 2016
DOI:
10.4236/jcc.2016.41003
4,982
Downloads
6,089
Views
Citations
Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes
(Articles)
Ashraf Al Sharah
,
Taiwo Oyedare
,
Sachin Shetty
Communications and Network
Vol.8 No.2
,March 31, 2016
DOI:
10.4236/cn.2016.82007
2,910
Downloads
3,768
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,841
Downloads
3,700
Views
Citations
RETRACTED: Isolating Wormhole Attack in Wireless Sensor Networks
(Articles)
L. Thanga Mariappan
,
K. Rubasoundar
Circuits and Systems
Vol.7 No.8
,June 29, 2016
DOI:
10.4236/cs.2016.78177
1,479
Downloads
2,527
Views
Citations
A Novel Review on Security and Routing Protocols in MANET
(Articles)
Muhammad Kashif Nazir
,
Rameez U. Rehman
,
Atif Nazir
Communications and Network
Vol.8 No.4
,September 22, 2016
DOI:
10.4236/cn.2016.84020
2,289
Downloads
5,582
Views
Citations
Practical Approaches to Securing an IT Environment
(Articles)
Emmanuel S. Kolawole
,
Warsame H. Ali
,
Cofie Penrose
,
John C. Fuller
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94019
1,883
Downloads
5,363
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
978
Downloads
2,251
Views
Citations
An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions
(Articles)
Mohammad Rafsun Islam
,
K. M. Aktheruzzaman
Journal of Computer and Communications
Vol.8 No.4
,April 2, 2020
DOI:
10.4236/jcc.2020.84002
1,528
Downloads
8,764
Views
Citations
Comparative Theoretical Studies of the Reactivity and Stability of Selected Groups of Isomers with Carbon-Oxygen and Carbon-Nitrogen Bonds
(Articles)
Issofa Patouossa
,
Eric N. Njabon
,
Alphonse Emadak
,
Naomi Zshika
Computational Chemistry
Vol.9 No.2
,April 30, 2021
DOI:
10.4236/cc.2021.92007
316
Downloads
921
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
250
Downloads
2,425
Views
Citations
Impact of Domestic Terrorism on Economy: A Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
iBusiness
Vol.15 No.1
,March 29, 2023
DOI:
10.4236/ib.2023.151006
177
Downloads
1,746
Views
Citations
Psychiatry in a War Situation:
In Situ
Therapeutic Approach to an Attack Case of Ber, Timbuktu in Mali
(Articles)
Kokou Messanh Agbémélé Soedje
,
Guy Gerard Aza-Gnandji
,
Damega Wenkourama
,
Tchédié Etdéchié Elvyreklikpo
,
Koffi Mawussé Mensah
,
Adjaré-Kamé Fidèle Ahara
,
Solo Conde
,
Koffi Djotepe Soedje
,
Kolou Simliwa Dassa
Open Journal of Psychiatry
Vol.13 No.4
,October 25, 2023
DOI:
10.4236/ojpsych.2023.134026
69
Downloads
278
Views
Citations
Epidemio-Clinical Profile of Psychotrauma in Military Victims of Terrorists Attacks in Benin in December 2021
(Articles)
Guy-Gérard Aza-Gnandji
,
David Sinet Koivogui
,
Kokou Messanh Agbémèlé Soedje
,
Tchedié Etdéchié Elvyre Klikpo
,
Josiane Ezin Houngbe
Open Journal of Psychiatry
Vol.13 No.6
,December 26, 2023
DOI:
10.4236/ojpsych.2023.136036
52
Downloads
180
Views
Citations
This article belongs to the Special Issue on
Schizophrenia
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top