Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A DoS Attacks Detection Aglorithm Based on Snort-BASE for Robotic Arm Control Systems
(Articles)
Nana Li
,
Yong Wang
,
Pengfei Shen
,
Shuangfei Li
,
Lin Zhou
Journal of Computer and Communications
Vol.10 No.4
,April 7, 2022
DOI:
10.4236/jcc.2022.104001
135
Downloads
595
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
684
Downloads
5,830
Views
Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment
(Articles)
Sanjeev Kumar
,
Orifiel Gomez
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12010
10,913
Downloads
21,182
Views
Citations
Discussion on IAEA and China Safety Regulation for NPP Coastal Defense Infrastructures against Typhoon/Hurricane Attacks
(Articles)
Guilin Liu
,
Huajun Li
,
Defu Liu
,
Fengqing Wang
,
Tao Zou
World Journal of Nuclear Science and Technology
Vol.2 No.3
,July 23, 2012
DOI:
10.4236/wjnst.2012.23017
4,609
Downloads
8,839
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
816
Downloads
5,211
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
126
Downloads
704
Views
Citations
Forecasting Shark Attack Risk Using AI: A Deep Learning Approach
(Articles)
Evan Valenti
Journal of Data Analysis and Information Processing
Vol.11 No.4
,October 12, 2023
DOI:
10.4236/jdaip.2023.114018
92
Downloads
541
Views
Citations
Recurrent Transient Ischemic Attacks Revealing Cerebral Amyloid Angiopathy: A Comprehensive Case
(Articles)
Kenza Khelfaoui Tredano
,
Houyam Tibar
,
Kaoutar El Alaoui Taoussi
,
Wafae Regragui
,
Abdeljalil El Quessar
,
Ali Benomar
World Journal of Neuroscience
Vol.14 No.1
,February 19, 2024
DOI:
10.4236/wjns.2024.141004
53
Downloads
189
Views
Citations
SAC-TA: A Secure Area Based Clustering for Data Aggregation Using Traffic Analysis in WSN
(Articles)
Mohanbabu Gopalakrishnan
,
Gopi Saminathan Arumugam
,
Karthigai Lakshmi
,
Shanmuga Vel
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78123
1,685
Downloads
3,193
Views
Citations
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Muhammad Farhan
,
Umar Mahmood
Journal of Information Security
Vol.12 No.3
,May 14, 2021
DOI:
10.4236/jis.2021.123010
364
Downloads
1,864
Views
Citations
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
141
Downloads
844
Views
Citations
<
...
2
3
4
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top