Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Average Power Reduction Method for Web Applications on Wireless Terminals
(Articles)
Toshiya Koyasu
,
Hideki Shimada
,
Kenya Sato
Communications and Network
Vol.4 No.2
,May 18, 2012
DOI:
10.4236/cn.2012.42018
4,685
Downloads
7,829
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,306
Downloads
18,267
Views
Citations
Systematic Review of Web Application Security Vulnerabilities Detection Methods
(Articles)
Sajjad Rafique
,
Mamoona Humayun
,
Zartasha Gul
,
Ansar Abbas
,
Hasan Javed
Journal of Computer and Communications
Vol.3 No.9
,September 15, 2015
DOI:
10.4236/jcc.2015.39004
7,869
Downloads
12,982
Views
Citations
Web Threats Detection and Prevention Framework
(Articles)
Osama M. Rababah
,
Ahmad K. Al Hwaitat
,
Saher Al Manaseer
,
Hussam N. Fakhouri
,
Rula Halaseh
Communications and Network
Vol.8 No.3
,August 4, 2016
DOI:
10.4236/cn.2016.83017
2,269
Downloads
3,550
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
303
Downloads
1,563
Views
Citations
Transformation of User Interface to Activity Models and Assessing Performance of WA/WS
(Articles)
Ch. Ram Mohan Reddy
,
D. Evangelin Geetha
,
R. V. Raghvendra Rao
,
T. V. Suresh Kumar
Journal of Software Engineering and Applications
Vol.12 No.5
,May 23, 2019
DOI:
10.4236/jsea.2019.125008
940
Downloads
2,560
Views
Citations
Security Engineering of SOA Applications Via Reliability Patterns
(Articles)
Luigi Coppolino
,
Luigi Romano
,
Valerio Vianello
Journal of Software Engineering and Applications
Vol.4 No.1
,January 27, 2011
DOI:
10.4236/jsea.2011.41001
5,932
Downloads
11,107
Views
Citations
Bridge the Gap—Incorporating Classroom Response Systems for Classroom-Embedded Formative Assessment
(Articles)
Weihua Shi
,
Jace Hargis
Open Access Library Journal
Vol.10 No.2
,February 27, 2023
DOI:
10.4236/oalib.1109829
163
Downloads
1,173
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
127
Downloads
575
Views
Citations
An Introduction to RFID Technology
(Articles)
Sanjay Ahuja
,
Pavan Potti
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23026
23,019
Downloads
39,513
Views
Citations
Services and Applications Based on Mobile User’s Location Detection and Prediction
(Articles)
M. Abo-Zahhad
,
Sabah M. Ahmed
,
M. Mourad
Int'l J. of Communications, Network and System Sciences
Vol.6 No.4
,April 17, 2013
DOI:
10.4236/ijcns.2013.64020
5,692
Downloads
9,162
Views
Citations
Smartphone Applications for the Radiologist
(Articles)
Hasanein Al-Hasani
,
Hamid Abboudi
,
Tishi Ninan
,
Behnam Shaygi
,
Carl Roobottom
Open Journal of Radiology
Vol.3 No.4
,December 31, 2013
DOI:
10.4236/ojrad.2013.34037
8,247
Downloads
12,367
Views
Citations
Nanomaterials for Sensor Applications
(Editorial)
Francisco Márquez
,
Carmen Morant
Soft Nanoscience Letters
Vol.5 No.1
,January 15, 2015
DOI:
10.4236/snl.2015.51001
7,217
Downloads
11,651
Views
Citations
Mobile Ad-Hoc Networks Applications and Its Challenges
(Articles)
Naeem Raza
,
Muhammad Umar Aftab
,
Muhammad Qasim Akbar
,
Omair Ashraf
,
Muhammad Irfan
Communications and Network
Vol.8 No.3
,July 20, 2016
DOI:
10.4236/cn.2016.83013
5,402
Downloads
28,721
Views
Citations
A Review of the Application of Nuclear Magnetic Resonance in Petroleum Industry
(Articles)
Ayorinde Janet Olaide
,
Ehinola Olugbenga
,
Durogbitan Abimbola
International Journal of Geosciences
Vol.11 No.4
,April 7, 2020
DOI:
10.4236/ijg.2020.114009
1,572
Downloads
5,839
Views
Citations
A Bayesian Regression Model and Applications
(Articles)
Yijun Yu
Journal of Applied Mathematics and Physics
Vol.8 No.9
,September 22, 2020
DOI:
10.4236/jamp.2020.89141
708
Downloads
2,021
Views
Citations
Learning Theory Principles for Psychotherapy
(Articles)
John R. Rossiter
Psychology
Vol.13 No.5
,May 27, 2022
DOI:
10.4236/psych.2022.135049
905
Downloads
5,319
Views
Citations
This article belongs to the Special Issue on
Psychotherapy Research
An Overview of NV Centers
(Articles)
Shuhan Guo
Journal of Applied Mathematics and Physics
Vol.11 No.11
,November 28, 2023
DOI:
10.4236/jamp.2023.1111231
529
Downloads
3,400
Views
Citations
Dynamic Service Discovery, Composition and Reconfiguration in a Model Mapping Business Process to Web Services
(Articles)
Zulqarnain Abdul Jabbar
,
Asia Samreen
Journal of Computer and Communications
Vol.4 No.9
,July 29, 2016
DOI:
10.4236/jcc.2016.49004
1,696
Downloads
2,715
Views
Citations
Applications of Norm and Situation Calculus in the Semantic Web Service Composition
(Articles)
Jun Zhao
,
Xiaozhu Gu
Journal of Software Engineering and Applications
Vol.3 No.8
,August 26, 2010
DOI:
10.4236/jsea.2010.38090
6,177
Downloads
9,717
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top