Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Applying Quantification of Qualitative Verbal Data to Asynchronous Written Discourse
(Articles)
Jamie Costley
,
Seung Lock Han
Creative Education
Vol.4 No.12A
,December 30, 2013
DOI:
10.4236/ce.2013.412A1001
3,531
Downloads
5,803
Views
Citations
This article belongs to the Special Issue on
Critical Thinking and Creative Education
Determination of Watershed Boundaries in Turkey by GIS Based Hydrological River Basin Coding
(Articles)
Y. Darama
,
K. Seyrek
Journal of Water Resource and Protection
Vol.8 No.11
,October 13, 2016
DOI:
10.4236/jwarp.2016.811078
2,688
Downloads
6,132
Views
Citations
Physical Layer Deterministic Network Coding Using PUM Turbo Codes over AWGN Channel, N Nodes through a Base Station Scenario
(Articles)
Hani Attar
Communications and Network
Vol.8 No.4
,November 28, 2016
DOI:
10.4236/cn.2016.84022
1,478
Downloads
2,396
Views
Citations
Network Coding Cooperation Performance Analysis in Wireless Network over a Lossy Channel, M Users and a Destination Scenario
(Articles)
Mohamed El-Hihi
,
Hani Attar
,
Ahmed A. A. Solyman
,
Lina Stankovic
Communications and Network
Vol.8 No.4
,November 30, 2016
DOI:
10.4236/cn.2016.84023
1,616
Downloads
2,944
Views
Citations
Research on HOXA11-AS in Malignant Tumors
(Articles)
Juncheng Guo
,
Jinfang Zheng
,
Yijun Yang
Journal of Cancer Therapy
Vol.12 No.1
,January 14, 2021
DOI:
10.4236/jct.2021.121003
378
Downloads
950
Views
Citations
TCP and UDP Control Bits Coded to Reduce Errors and/or Retransmissions
(Articles)
Chrislin Martial Lélé
Int'l J. of Communications, Network and System Sciences
Vol.18 No.3
,March 31, 2025
DOI:
10.4236/ijcns.2025.183003
33
Downloads
171
Views
Citations
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,933
Downloads
5,841
Views
Citations
Do ICMP Security Attacks Have Same Impact on Servers?
(Articles)
Ganesh Reddy Gunnam
,
Sanjeev Kumar
Journal of Information Security
Vol.8 No.3
,July 25, 2017
DOI:
10.4236/jis.2017.83018
1,601
Downloads
4,580
Views
Citations
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
(Articles)
Sharmila Bista
,
Roshan Chitrakar
Journal of Information Security
Vol.9 No.1
,December 20, 2017
DOI:
10.4236/jis.2018.91004
1,745
Downloads
4,470
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,534
Downloads
7,392
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.4
,August 16, 2018
DOI:
10.4236/jis.2018.94016
3,927
Downloads
9,792
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
110
Downloads
510
Views
Citations
Big Data & DDoS ATTACKS: A Discussion of Ensemble Algorithms to Detect Cyber Attacks
(Articles)
Anja Housden-Brooks
Journal of Computer and Communications
Vol.12 No.12
,December 30, 2024
DOI:
10.4236/jcc.2024.1212014
32
Downloads
289
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
33
Downloads
161
Views
Citations
‘Fading is Our Friend!’: A Performance Comparison of WiMAX-MIMO/MISO/SISO Communication Systems
(Articles)
A. ROHAN
,
N. DAILLY
,
P. KUSUMWAL
Engineering
Vol.2 No.1
,January 27, 2010
DOI:
10.4236/eng.2010.21004
6,877
Downloads
12,898
Views
Citations
Very Low Bit-Rate Video Coding by Combining H.264/AVC Standard and 2-D Discrete Wavelet Transform
(Articles)
Ali Aghagolzadeh
,
Saeed Meshgini
,
Mehdi Nooshyar
,
Mehdi Aghagolzadeh
Wireless Sensor Network
Vol.2 No.4
,April 23, 2010
DOI:
10.4236/wsn.2010.24044
6,006
Downloads
10,772
Views
Citations
An Integrative Account of Neural Network Interaction: Neuro-Messenger Theory
(Articles)
Tien-Wen Lee
World Journal of Neuroscience
Vol.11 No.2
,May 12, 2021
DOI:
10.4236/wjns.2021.112011
393
Downloads
951
Views
Citations
The Effect of Coding Method on Cause-of-Death Rankings
(Articles)
Peter Harteloh
Open Journal of Statistics
Vol.13 No.6
,December 6, 2023
DOI:
10.4236/ojs.2023.136039
120
Downloads
462
Views
Citations
Incremental Computation of Success Patterns of Logic Programs
(Articles)
Lunjin Lu
Journal of Software Engineering and Applications
Vol.3 No.3
,April 8, 2010
DOI:
10.4236/jsea.2010.33025
6,803
Downloads
10,048
Views
Citations
A Design of Incremental Granular Network for Software Data Modeling
(Articles)
Keun-Chang Kwak
Journal of Software Engineering and Applications
Vol.3 No.11
,November 29, 2010
DOI:
10.4236/jsea.2010.311120
5,432
Downloads
9,212
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top