Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Quantifying Malware Evolution through Archaeology
(Articles)
Jeremy D. Seideman
,
Bilal Khan
,
Cesar Vargas
Journal of Information Security
Vol.6 No.2
,March 31, 2015
DOI:
10.4236/jis.2015.62011
6,133
Downloads
7,294
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
125
Downloads
595
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,334
Downloads
8,653
Views
Citations
Malware Images Classification Using Convolutional Neural Network
(Articles)
Espoir K. Kabanga
,
Chang Hoon Kim
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61016
2,191
Downloads
8,772
Views
Citations
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
8,833
Downloads
15,940
Views
Citations
A Comparison of Malware Detection Techniques Based on Hidden Markov Model
(Articles)
Saja Alqurashi
,
Omar Batarfi
Journal of Information Security
Vol.7 No.3
,April 22, 2016
DOI:
10.4236/jis.2016.73017
4,754
Downloads
8,138
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
627
Downloads
1,978
Views
Citations
An Analytical Model Modifications and Adaptations for Malware Spread and Containment in Communication Networks
(Articles)
Moses Okechukwu Onyesolu
,
Charles Okechukwu Ugwunna
Open Access Library Journal
Vol.10 No.7
,July 31, 2023
DOI:
10.4236/oalib.1110174
36
Downloads
228
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,988
Downloads
5,372
Views
Citations
Majority Voting Ransomware Detection System
(Articles)
Simon R. Davies
,
Richard Macfarlane
,
William J. Buchanan
Journal of Information Security
Vol.14 No.4
,August 16, 2023
DOI:
10.4236/jis.2023.144016
117
Downloads
599
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A New Model for Spreading Malware over SMS Using Network Automata
(Articles)
Erick Iván Medina-Salas
,
Ana Lilia Laureano-Cruces
,
Ma. Elena Lárraga-Ramírez
Communications and Network
Vol.15 No.4
,November 24, 2023
DOI:
10.4236/cn.2023.154008
164
Downloads
852
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,905
Downloads
5,179
Views
Citations
Captcha-Based Honey Net Model against Malicious Codes
(Articles)
Adeniyi Akanni
,
Williams Akanni
,
Oluwafunmilasyo Helen Daso
Journal of Computer and Communications
Vol.11 No.3
,March 31, 2023
DOI:
10.4236/jcc.2023.113012
70
Downloads
541
Views
Citations
Exploring the Effects of Gap-Penalties in Sequence-Alignment Approach to Polymorphic Virus Detection
(Articles)
Vijay Naidu
,
Jacqueline Whalley
,
Ajit Narayanan
Journal of Information Security
Vol.8 No.4
,October 19, 2017
DOI:
10.4236/jis.2017.84020
1,102
Downloads
2,817
Views
Citations
Thermal Decomposition and a Kinetic Study of Poly(Para-Substituted Styrene)s
(Articles)
Ayşegül Şenocak
,
Cemil Alkan
,
Ahmet Karadağ
American Journal of Analytical Chemistry
Vol.7 No.3
,March 9, 2016
DOI:
10.4236/ajac.2016.73021
2,893
Downloads
5,512
Views
Citations
This article belongs to the Special Issue on
Thermogravimetric Analysis
Prioritization of Sub-Watersheds in a Large Semi-Arid Drainage Basin (Southern Jordan) Using Morphometric Analysis, GIS, and Multivariate Statistics
(Articles)
Yahya Farhan
,
Ali Anbar
,
Nisreen Al-Shaikh
,
Haifa Almohammad
,
Sireen Alshawamreh
,
Manal Barghouthi
Agricultural Sciences
Vol.9 No.4
,April 30, 2018
DOI:
10.4236/as.2018.94031
1,236
Downloads
2,591
Views
Citations
Leveraging GIS in Supply Chain Management for Floriculture Application: Nairobi County, Kenya
(Articles)
Catherine Akinyi Odera
,
Faith Njoki Karanja
Journal of Geographic Information System
Vol.11 No.3
,June 28, 2019
DOI:
10.4236/jgis.2019.113024
998
Downloads
2,452
Views
Citations
Media Reports of the COVID-19 Pandemic: A Computational Text Analysis of English Reports in China, the UK, and the US
(Articles)
Shuran Yang
,
Wenxiang Zhang
,
Zhao Yuan
Advances in Journalism and Communication
Vol.9 No.2
,May 11, 2021
DOI:
10.4236/ajc.2021.92004
734
Downloads
2,300
Views
Citations
Research on the Evaluation Index System and Methodology for the Construction of Ecological Civilization Model Cities
—Yancheng City as an Example
(Articles)
Yuanyuan Sun
,
Jun Chai
,
Wanbin Li
,
Yahui Ren
Open Journal of Business and Management
Vol.10 No.3
,May 31, 2022
DOI:
10.4236/ojbm.2022.103081
104
Downloads
521
Views
Citations
Fracture Mechanics and Its Application in the Fatigue Behavior of Reinforced Welded Hand-Holes in Aluminum Light Poles
(Articles)
Cameron R. Rusnak
,
Craig C. Menzemer
Open Journal of Civil Engineering
Vol.13 No.4
,December 14, 2023
DOI:
10.4236/ojce.2023.134045
46
Downloads
229
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top