Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,668
Downloads
15,942
Views
Citations
Midwife’s experiences of using intuition as a motivating element in conveying assurance and care
(Articles)
Agneta Olsson
,
Annsofie Adolfsson
Health
Vol.3 No.7
,July 18, 2011
DOI:
10.4236/health.2011.37075
4,752
Downloads
9,613
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23013
5,778
Downloads
11,309
Views
Citations
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34026
5,927
Downloads
8,981
Views
Citations
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce
(Articles)
Mehrbakhsh Nilashi
,
Karamollah Bagherifard
,
Othman Ibrahim
,
Nasim Janahmadi
,
Mousa Barisami
Engineering
Vol.3 No.11
,November 24, 2011
DOI:
10.4236/eng.2011.311132
10,685
Downloads
24,344
Views
Citations
Design and Development of a House-Mobile Security System
(Articles)
Ashraf Elfasakhany
,
Jorge Hernández
,
Juan Carlos García
,
Mario Reyes
,
Francisco Martell
Engineering
Vol.3 No.12
,December 14, 2011
DOI:
10.4236/eng.2011.312151
10,197
Downloads
16,935
Views
Citations
Evaluation of Electrocardiogram for Biometric Authentication
(Articles)
Yogendra Narain Singh
,
S K Singh
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31005
24,410
Downloads
36,391
Views
Citations
Combining Public Key Encryption with Schnorr Digital Signature
(Articles)
Laura Savu
Journal of Software Engineering and Applications
Vol.5 No.2
,February 27, 2012
DOI:
10.4236/jsea.2012.52016
9,292
Downloads
15,247
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44017
8,930
Downloads
16,130
Views
Citations
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
(Articles)
Yaser Jararweh
,
Lo’ai Tawalbeh
,
Hala Tawalbeh
,
Abidalrahman Moh’d
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32008
8,675
Downloads
14,851
Views
Citations
Evaluation of Operating Domains in Power Systems
(Articles)
M. A. El-Kady
,
Y. A. Alturki
,
M. S. Al-Saud
Energy and Power Engineering
Vol.4 No.4
,June 25, 2012
DOI:
10.4236/epe.2012.44037
4,614
Downloads
7,294
Views
Citations
A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks
(Articles)
Pengcheng Zhao
,
Yong Xu
,
Min Nan
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48029
4,368
Downloads
7,338
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,099
Downloads
7,260
Views
Citations
Challenges of Energy Security to the Industrialisation and Sustainable Development in Vietnam
(Articles)
Nguyen Tan Phat
Technology and Investment
Vol.3 No.3
,August 31, 2012
DOI:
10.4236/ti.2012.33024
6,155
Downloads
9,474
Views
Citations
Managing Social Security Data in the Web 2.0 Era
(Articles)
Li Luo
,
Hongyan Yang
,
Xuhui Li
iBusiness
Vol.4 No.3
,September 27, 2012
DOI:
10.4236/ib.2012.43028
4,486
Downloads
7,072
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,122
Downloads
9,773
Views
Citations
A Formal Model of Conformity and Security Testing of Inheritance for Object Oriented Constraint Programming
(Articles)
Khalid Benlhachmi
,
Mohammed Benattou
Journal of Information Security
Vol.4 No.2
,April 23, 2013
DOI:
10.4236/jis.2013.42013
4,401
Downloads
7,061
Views
Citations
Promoting sense of security in old-age care
(Articles)
Martina Boström
,
Marie Ernsth Bravell
,
Dan Lundgren
,
Anita Björklund
Health
Vol.5 No.6B
,June 17, 2013
DOI:
10.4236/health.2013.56A2009
7,793
Downloads
13,965
Views
Citations
This article belongs to the Special Issue on
Advances in Health Care and Rehabilitation Medicine
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,029
Downloads
6,378
Views
Citations
Critical Energy Infrastructure: Cyberterrorism Threats and Means of Protection
(Articles)
V. A. Vasenin
Journal of Software Engineering and Applications
Vol.6 No.9A
,September 25, 2013
DOI:
10.4236/jsea.2013.69A003
6,296
Downloads
8,359
Views
Citations
This article belongs to the Special Issue on
Software Engineering for Safety-Critical Systems and Medical Devices
<
...
49
50
51
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top