Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Global Stability of SEIQRS Computer Virus Propagation Model with Non-Linear Incidence Function
(Articles)
Qaisar Badshah
Applied Mathematics
Vol.6 No.11
,October 29, 2015
DOI:
10.4236/am.2015.611170
2,428
Downloads
3,328
Views
Citations
Reduce Malicious Activity in Trusted Programs
(Articles)
Elliot Ito
,
Depeng Li
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010003
71
Downloads
474
Views
Citations
The Effects of Objects-First and Objects-Late Methods on Achievements of OOP Learners
(Articles)
Murat Pasa Uysal
Journal of Software Engineering and Applications
Vol.5 No.10
,October 31, 2012
DOI:
10.4236/jsea.2012.510094
4,520
Downloads
7,331
Views
Citations
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
(Articles)
S. Gopalakrishnan
,
P. Mohan Kumar
Circuits and Systems
Vol.7 No.6
,May 12, 2016
DOI:
10.4236/cs.2016.76064
2,467
Downloads
4,307
Views
Citations
Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
(Articles)
A. R. Rajeswari
,
K. Kulothungan
,
S. Ganapathy
,
A. Kannan
Circuits and Systems
Vol.7 No.8
,June 30, 2016
DOI:
10.4236/cs.2016.78180
1,961
Downloads
3,657
Views
Citations
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
883
Downloads
1,796
Views
Citations
This article belongs to the Special Issue on
Power System Protection
Semi-Automatic Objects Recognition in Urban Areas Based on Fuzzy Logic
(Articles)
Federico Prandi
,
Raffaella Brumana
,
Francesco Fassi
Journal of Geographic Information System
Vol.2 No.2
,May 14, 2010
DOI:
10.4236/jgis.2010.22011
5,186
Downloads
9,310
Views
Citations
Efficient Location Services Using Hierarchical Topology of Mobile Ad Hoc Networks
(Articles)
Prasad Naik Hamsavath
,
G. V. Singh
Journal of Software Engineering and Applications
Vol.5 No.1
,December 31, 2011
DOI:
10.4236/jsea.2012.51003
4,836
Downloads
8,090
Views
Citations
Social Functions in Autistic Children and Interaction with/through Object: A Brief Report
(Articles)
Giulia Savarese
,
Federico Manzi
,
Antonio Iannaccone
Psychology
Vol.8 No.8
,June 12, 2017
DOI:
10.4236/psych.2017.88073
1,343
Downloads
2,463
Views
Citations
This article belongs to the Special Issue on
Psychology for Autism
2-Convex Polyominoes: Non-Empty Corners
(Articles)
Khalil Tawbe
,
Nadine Ghandour
,
Ali Atwi
Open Journal of Discrete Mathematics
Vol.9 No.2
,March 7, 2019
DOI:
10.4236/ojdm.2019.92005
638
Downloads
1,301
Views
Citations
Reconstruction of 2-Convex Polyominoes with Non-Empty Corners
(Articles)
Khalil Tawbe
,
Salwa Mansour
Open Journal of Discrete Mathematics
Vol.9 No.4
,August 9, 2019
DOI:
10.4236/ojdm.2019.94009
494
Downloads
1,034
Views
Citations
The Generation of Quantum Objects by Quantum Loops
(Articles)
Hans H. Diel
Open Access Library Journal
Vol.6 No.9
,September 24, 2019
DOI:
10.4236/oalib.1105700
314
Downloads
916
Views
Citations
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks
(Articles)
Seo Hyun Oh
,
Chan O. Hong
,
Yoon Hwa Choi
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43012
6,685
Downloads
12,885
Views
Citations
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks
(Articles)
Sung-Jib Yim
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49032
5,801
Downloads
10,429
Views
Citations
A New Method for Sensing Cognitive Radio Network under Malicious Attacker
(Articles)
Shaahin Tabatabaee
,
Vahid Tabataba Vakili
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61007
4,452
Downloads
6,620
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,829
Downloads
3,674
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
118
Downloads
498
Views
Citations
T-SCORM: An Extension of the SCORM Standard to Support the Project of Educational Contents for t-Learning
(Articles)
Francisco Miguel da Silva
,
Francisco Milton Mendes Neto
,
Aquiles Medeiros Filgueira Burlamaqui
,
Diogo Henrique Duarte Bezerra
Creative Education
Vol.3 No.1
,February 22, 2012
DOI:
10.4236/ce.2012.31017
5,913
Downloads
9,188
Views
Citations
Perturbation Functions in Computer Graphics
(Articles)
Sergey I. Vyatkin
,
Boris S. Dolgovesov
,
Mikhail A. Gorodilov
Modern Instrumentation
Vol.2 No.2
,April 30, 2013
DOI:
10.4236/mi.2013.22005
4,545
Downloads
8,352
Views
Citations
Comparative analysis of magnetic fields, low temperatures and their combined action on growth of some conditionally pathogenic and normal humane microflora
(Articles)
Olena V. Derev’yanko
,
Oleksandr I. Raichenko
,
Vladimir S. Mosienko
,
Vladimir O. Shlyakhovenko
,
Yuri V. Yanish
,
Olena V. Karnaushenko
Open Journal of Ecology
Vol.3 No.7
,November 26, 2013
DOI:
10.4236/oje.2013.37054
3,235
Downloads
5,121
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top