Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Review and Measuring the Efficiency of SQL Injection Method in Preventing E-Mail Hacking
(Articles)
Ahmed A. M. Sharadqeh
,
As'ad Mahmoud Alnaser
,
Omar Al Heyasat
,
Ashraf Abdel-Karim Abu-Ein
,
Hazem (Moh'd Said) Hatamleh
Int'l J. of Communications, Network and System Sciences
Vol.5 No.6
,June 12, 2012
DOI:
10.4236/ijcns.2012.56044
4,845
Downloads
8,540
Views
Citations
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,295
Downloads
5,994
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,536
Downloads
13,191
Views
Citations
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem
(Articles)
Rasim Alguliyev
,
Saadat Nazirova
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31002
4,333
Downloads
8,891
Views
Citations
Use and Attitudes towards Teleconsultation in Dentistry
(Articles)
Eino Ignatius
,
K. Mäkelä
E-Health Telecommunication Systems and Networks
Vol.2 No.1
,March 29, 2013
DOI:
10.4236/etsn.2013.21002
3,311
Downloads
6,620
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
2,373
Downloads
5,386
Views
Citations
Analysis of Database Security
(Articles)
Xueying Pan
,
Anthony Obahiaghon
,
Brendan Makar
,
Samuel Wilson
,
Christian Beard
Open Access Library Journal
Vol.11 No.4
,April 15, 2024
DOI:
10.4236/oalib.1111366
166
Downloads
1,265
Views
Citations
Survey on Spam Filtering Techniques
(Articles)
Saadat Nazirova
Communications and Network
Vol.3 No.3
,August 10, 2011
DOI:
10.4236/cn.2011.33019
9,796
Downloads
18,849
Views
Citations
Design & Test of an Advanced Web Security Analysis Tool (AWSAT)
(Articles)
Meenakshi S. P. Manikandaswamy
,
Vijay Madisetti
Journal of Software Engineering and Applications
Vol.17 No.5
,May 31, 2024
DOI:
10.4236/jsea.2024.175024
95
Downloads
426
Views
Citations
Design and Analysis of an Electronic Platform for Examinations
(Articles)
Daniel Paul Godwin
,
Modi Bala
,
Abdulfatai Habib
Open Access Library Journal
Vol.5 No.11
,November 23, 2018
DOI:
10.4236/oalib.1104919
408
Downloads
1,378
Views
Citations
Cyber Warfare: A New Hullaballoo under International Humanitarian Law
(Articles)
Yohannes Eneyew Ayalew
Beijing Law Review
Vol.6 No.4
,October 15, 2015
DOI:
10.4236/blr.2015.64021
4,986
Downloads
6,730
Views
Citations
Operational Sustainability and Digital Leadership for Cybercrime Prevention
(Articles)
Bahaudin G. Mujtaba
International Journal of Internet and Distributed Systems
Vol.5 No.2
,October 13, 2023
DOI:
10.4236/ijids.2023.52002
279
Downloads
1,208
Views
Citations
A Facilitated Interface to Generate a Combined Textual and Graphical Database System Using Widely Available Software
(Articles)
Corey Lawson
,
Kirk Larson
,
Jonathan Van Erdewyk
,
Christopher Smith
,
Al Rizzo
,
Landon Ross
,
Marc Rendell
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510091
4,808
Downloads
6,861
Views
Citations
A Comparative Study of Unstructured Data with SQL and NO-SQL Database Management Systems
(Articles)
Ahsan Malik
,
Aqil Burney
,
Fawad Ahmed
Journal of Computer and Communications
Vol.8 No.4
,April 15, 2020
DOI:
10.4236/jcc.2020.84005
2,145
Downloads
9,727
Views
Citations
Comparing Large Language Models for Generating Complex Queries
(Articles)
Limin Ma
,
Ken Pu
,
Ying Zhu
,
Wesley Taylor
Journal of Computer and Communications
Vol.13 No.2
,February 28, 2025
DOI:
10.4236/jcc.2025.132015
60
Downloads
315
Views
Citations
This article belongs to the Special Issue on
Artificial Intelligence and Applications
Using Genetic Algorithm as Test Data Generator for Stored PL/SQL Program Units
(Articles)
Mohammad A. Alshraideh
,
Basel A. Mahafzah
,
Hamzeh S. Eyal Salman
,
Imad Salah
Journal of Software Engineering and Applications
Vol.6 No.2
,February 28, 2013
DOI:
10.4236/jsea.2013.62011
5,532
Downloads
10,446
Views
Citations
Object Oriented Query Response Time for UML Models
(Articles)
Vipin Saxena
,
Santosh Kumar
Journal of Software Engineering and Applications
Vol.5 No.7
,June 15, 2012
DOI:
10.4236/jsea.2012.57059
6,780
Downloads
10,378
Views
Citations
Web Threats Detection and Prevention Framework
(Articles)
Osama M. Rababah
,
Ahmad K. Al Hwaitat
,
Saher Al Manaseer
,
Hussam N. Fakhouri
,
Rula Halaseh
Communications and Network
Vol.8 No.3
,August 4, 2016
DOI:
10.4236/cn.2016.83017
2,269
Downloads
3,544
Views
Citations
Design and Implementation of Enterprise Office Automation System Based on Web Service Framework & Data Mining Techniques
(Articles)
Muhammad Awais Javed
,
Mahfuz Alam
,
Md. Ariful Alam
,
Rakibul Islam
,
Md. Naimul Ahsan
Journal of Data Analysis and Information Processing
Vol.12 No.4
,September 29, 2024
DOI:
10.4236/jdaip.2024.124028
230
Downloads
1,846
Views
Citations
Object-Oriented Database Connectivity for Hand Held Devices
(Articles)
Vipin Saxena
,
Santosh Kumar
Journal of Software Engineering and Applications
Vol.5 No.5
,May 29, 2012
DOI:
10.4236/jsea.2012.55037
6,395
Downloads
10,494
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top