Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,524
Downloads
4,329
Views
Citations
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
(Articles)
Sharmila Bista
,
Roshan Chitrakar
Journal of Information Security
Vol.9 No.1
,December 20, 2017
DOI:
10.4236/jis.2018.91004
1,593
Downloads
4,227
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,377
Downloads
7,273
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.4
,August 16, 2018
DOI:
10.4236/jis.2018.94016
3,736
Downloads
9,491
Views
Citations
Match Analysis in a University Taekwondo Championship
(Articles)
Coral Falco
,
Raul Landeo
,
Cristina Menescardi
,
José Luis Bermejo
,
Isaac Estevan
Advances in Physical Education
Vol.2 No.1
,February 16, 2012
DOI:
10.4236/ape.2012.21005
7,421
Downloads
17,043
Views
Citations
Kite Modeling for Higher Altitude Wind Energy
(Articles)
Hong Zhang
Energy and Power Engineering
Vol.5 No.7
,September 18, 2013
DOI:
10.4236/epe.2013.57052
7,802
Downloads
11,856
Views
Citations
A review on periodontitis versus endodontics
(Review)
Mohammad Salarpour
,
Mahsa Bamadi
,
Elaheh Salarpour
,
Masood Bamadi
Health
Vol.5 No.11
,November 12, 2013
DOI:
10.4236/health.2013.511243
3,611
Downloads
5,309
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,217
Downloads
13,273
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,721
Downloads
3,147
Views
Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials
(Articles)
Tatiana L. Ávalos-Rendón
,
Carlos Javier Mendoza
Materials Sciences and Applications
Vol.8 No.2
,February 6, 2017
DOI:
10.4236/msa.2017.82008
1,991
Downloads
3,856
Views
Citations
Improvements in a Puzzle Authentication Method
(Articles)
Yutaka Hirakawa
,
Ayaka Shimoda
,
Isao Sasano
,
Kazuo Ohzeki
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61002
704
Downloads
1,861
Views
Citations
Posttraumatic Stress Disorder Mediated by Exposure Level in French Civil Firefighters Following a Terrorist Attack: Some Hypotheses towards a Structural Model
(Articles)
Angelika Wolman
,
Jean-Marie Stève
,
Marion Samor
,
Evelyne Bouteyre
,
Themistoklis Apostolidis
,
Abdessadek El Ahmadi
World Journal of Neuroscience
Vol.10 No.3
,August 6, 2020
DOI:
10.4236/wjns.2020.103014
465
Downloads
1,223
Views
Citations
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
(Articles)
Suhail Qadir
,
Uzair Bashir
Journal of Information Security
Vol.13 No.2
,April 11, 2022
DOI:
10.4236/jis.2022.132004
324
Downloads
1,548
Views
Citations
Generalized Anxiety Disorder: A Review of Current Literature in Saudi Arabia
(Articles)
Omar Abdulqader Bamalan
,
Nader Mohammed Alosaimi
,
Abdulrahman Abdulrazzaq Alfryyan
,
Hussain Jawad Aljubran
,
Faris Hamoud Alanazi
,
Zaheenul Islam Siddiqui
Psychology
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/psych.2023.141003
268
Downloads
2,404
Views
Citations
This article belongs to the Special Issue on
Depression and Anxiety
COVID-19 and Cardiovascular Disease—Two Pandemics, One Success
(Articles)
Robert Philip Eaton
,
Barry Ramo
,
Martin Hickey
,
David S. Schade
World Journal of Cardiovascular Diseases
Vol.13 No.4
,April 28, 2023
DOI:
10.4236/wjcd.2023.134021
73
Downloads
425
Views
Citations
Anesthetic and Obstetric Considerations of Moyamoya Disease in Pregnancy after Intracranial Bypass Grafting: A Case Report and Literature Review
(Case Report)
Dennerd Ovando Jr.
,
Arit Ntekim
,
Ming Xiong
Open Journal of Anesthesiology
Vol.13 No.5
,May 15, 2023
DOI:
10.4236/ojanes.2023.135010
71
Downloads
562
Views
Citations
Studies on Chemical Resistance of PET-Mortar Composites: Microstructure and Phase Composition Changes
(Articles)
Ahmed Soufiane Benosman
,
Mohamed Mouli
,
Hamed Taibi
,
Mohamed Belbachir
,
Yassine Senhadji
,
Ilies Bahlouli
,
David Houivet
Engineering
Vol.5 No.4
,April 29, 2013
DOI:
10.4236/eng.2013.54049
7,282
Downloads
11,372
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,504
Downloads
5,115
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,668
Downloads
9,133
Views
Citations
Classification Approach for Intrusion Detection in Vehicle Systems
(Articles)
Abdulaziz Alshammari
,
Mohamed A. Zohdy
,
Debatosh Debnath
,
George Corser
Wireless Engineering and Technology
Vol.9 No.4
,October 31, 2018
DOI:
10.4236/wet.2018.94007
2,509
Downloads
6,680
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top