Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Global Stability of SEIQRS Computer Virus Propagation Model with Non-Linear Incidence Function
(Articles)
Qaisar Badshah
Applied Mathematics
Vol.6 No.11
,October 29, 2015
DOI:
10.4236/am.2015.611170
2,434
Downloads
3,351
Views
Citations
Reduce Malicious Activity in Trusted Programs
(Articles)
Elliot Ito
,
Depeng Li
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010003
75
Downloads
493
Views
Citations
The Effects of Objects-First and Objects-Late Methods on Achievements of OOP Learners
(Articles)
Murat Pasa Uysal
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510094
4,549
Downloads
7,398
Views
Citations
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
(Articles)
S. Gopalakrishnan
,
P. Mohan Kumar
Circuits and Systems
Vol.7 No.6
,May 12, 2016
DOI:
10.4236/cs.2016.76064
2,475
Downloads
4,332
Views
Citations
Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
(Articles)
A. R. Rajeswari
,
K. Kulothungan
,
S. Ganapathy
,
A. Kannan
Circuits and Systems
Vol.7 No.8
,June 30, 2016
DOI:
10.4236/cs.2016.78180
1,971
Downloads
3,692
Views
Citations
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
890
Downloads
1,812
Views
Citations
This article belongs to the Special Issue on
Power System Protection
Semi-Automatic Objects Recognition in Urban Areas Based on Fuzzy Logic
(Articles)
Federico Prandi
,
Raffaella Brumana
,
Francesco Fassi
Journal of Geographic Information System
Vol.2 No.2
,May 14, 2010
DOI:
10.4236/jgis.2010.22011
5,192
Downloads
9,331
Views
Citations
Efficient Location Services Using Hierarchical Topology of Mobile Ad Hoc Networks
(Articles)
Prasad Naik Hamsavath
,
G. V. Singh
Journal of Software Engineering and Applications
Vol.5 No.1
,December 31, 2011
DOI:
10.4236/jsea.2012.51003
4,841
Downloads
8,109
Views
Citations
Social Functions in Autistic Children and Interaction with/through Object: A Brief Report
(Articles)
Giulia Savarese
,
Federico Manzi
,
Antonio Iannaccone
Psychology
Vol.8 No.8
,June 12, 2017
DOI:
10.4236/psych.2017.88073
1,349
Downloads
2,487
Views
Citations
This article belongs to the Special Issue on
Psychology for Autism
2-Convex Polyominoes: Non-Empty Corners
(Articles)
Khalil Tawbe
,
Nadine Ghandour
,
Ali Atwi
Open Journal of Discrete Mathematics
Vol.9 No.2
,March 7, 2019
DOI:
10.4236/ojdm.2019.92005
640
Downloads
1,310
Views
Citations
Reconstruction of 2-Convex Polyominoes with Non-Empty Corners
(Articles)
Khalil Tawbe
,
Salwa Mansour
Open Journal of Discrete Mathematics
Vol.9 No.4
,August 9, 2019
DOI:
10.4236/ojdm.2019.94009
508
Downloads
1,062
Views
Citations
The Generation of Quantum Objects by Quantum Loops
(Articles)
Hans H. Diel
Open Access Library Journal
Vol.6 No.9
,September 24, 2019
DOI:
10.4236/oalib.1105700
319
Downloads
936
Views
Citations
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks
(Articles)
Seo Hyun Oh
,
Chan O. Hong
,
Yoon Hwa Choi
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43012
6,695
Downloads
12,907
Views
Citations
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks
(Articles)
Sung-Jib Yim
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49032
5,810
Downloads
10,475
Views
Citations
A New Method for Sensing Cognitive Radio Network under Malicious Attacker
(Articles)
Shaahin Tabatabaee
,
Vahid Tabataba Vakili
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61007
4,463
Downloads
6,642
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,842
Downloads
3,702
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
131
Downloads
641
Views
Citations
T-SCORM: An Extension of the SCORM Standard to Support the Project of Educational Contents for t-Learning
(Articles)
Francisco Miguel da Silva
,
Francisco Milton Mendes Neto
,
Aquiles Medeiros Filgueira Burlamaqui
,
Diogo Henrique Duarte Bezerra
Creative Education
Vol.3 No.1
,February 22, 2012
DOI:
10.4236/ce.2012.31017
5,919
Downloads
9,206
Views
Citations
Perturbation Functions in Computer Graphics
(Articles)
Sergey I. Vyatkin
,
Boris S. Dolgovesov
,
Mikhail A. Gorodilov
Modern Instrumentation
Vol.2 No.2
,April 30, 2013
DOI:
10.4236/mi.2013.22005
4,564
Downloads
8,394
Views
Citations
Comparative analysis of magnetic fields, low temperatures and their combined action on growth of some conditionally pathogenic and normal humane microflora
(Articles)
Olena V. Derev’yanko
,
Oleksandr I. Raichenko
,
Vladimir S. Mosienko
,
Vladimir O. Shlyakhovenko
,
Yuri V. Yanish
,
Olena V. Karnaushenko
Open Journal of Ecology
Vol.3 No.7
,November 26, 2013
DOI:
10.4236/oje.2013.37054
3,243
Downloads
5,142
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top