Scientific Research An Academic Publisher
OPEN ACCESS
Improvements in a Puzzle Authentication Method (Articles)
Yutaka Hirakawa, Ayaka Shimoda, Isao Sasano, Kazuo Ohzeki
Journal of Computer and Communications Vol.6 No.1,December 29, 2017
DOI: 10.4236/jcc.2018.61002 443 Downloads 832 Views Citations
Effects of Video-Supported Web-Based Peer Assessment on Microteaching Applications: Computer Teacher Candidates Sample (Articles)
Gülten Kavas, Nesrin Özdener
Creative Education Vol.3 No.7,November 21, 2012
DOI: 10.4236/ce.2012.37181 3,001 Downloads 4,640 Views Citations
Quantitative Evaluation of Cyber-Attacks on a Hypothetical School Computer Network (Articles)
Akinjide A. Akinola, Adeyemi A. Adekoya, Ayoade O. Kuye, Abiodun Ayodeji
Journal of Information Security Vol.10 No.3,June 17, 2019
DOI: 10.4236/jis.2019.103006 416 Downloads 841 Views Citations
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack (Articles)
Hyun Woo Lee, Tae Ho Cho
Wireless Sensor Network Vol.4 No.8,August 29, 2012
DOI: 10.4236/wsn.2012.48027 4,090 Downloads 5,917 Views Citations
A Novel Solution to Handle DDOS Attack in MANET (Articles)
Meghna Chhabra, Brij Gupta, Ammar Almomani
Journal of Information Security Vol.4 No.3,July 16, 2013
DOI: 10.4236/jis.2013.43019 6,107 Downloads 10,370 Views Citations
Public Key Infrastructure: A Survey (Articles)
Aysha Albarqi, Ethar Alzaid, Fatimah Al Ghamdi, Somaya Asiri, Jayaprakash Kar
Journal of Information Security Vol.6 No.1,January 8, 2015
DOI: 10.4236/jis.2015.61004 4,006 Downloads 5,972 Views Citations
A W-EAP Algorithm for IEC 61850 Protocol against DoS/Replay Attack (Articles)
Minmin Xie, Yong Wang, Chunming Zou, Yingjie Tian, Naiwang Guo
Journal of Computer and Communications Vol.8 No.11,November 24, 2020
DOI: 10.4236/jcc.2020.811007 50 Downloads 110 Views Citations
Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks (Articles)
Vennam Ratna Kumari, Aitha Nagaraju, Gaurav Pareek
Journal of Sensor Technology Vol.4 No.2,May 21, 2014
DOI: 10.4236/jst.2014.42006 3,641 Downloads 4,770 Views Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment (Articles)
Sanjeev Kumar, Orifiel Gomez
Journal of Information Security Vol.1 No.2,October 29, 2010
DOI: 10.4236/jis.2010.12010 9,352 Downloads 17,527 Views Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks (Articles)
Rodolfo Baez Junior, Sanjeev Kumar
Journal of Information Security Vol.5 No.3,July 24, 2014
DOI: 10.4236/jis.2014.53012 4,788 Downloads 6,037 Views Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods (Articles)
Arman Sargolzaei, Kang Yen, Mohamed Abdelghani, Alireza Abbaspour, Saman Sargolzaei
Intelligent Control and Automation Vol.8 No.3,August 23, 2017
DOI: 10.4236/ica.2017.83013 920 Downloads 1,716 Views Citations
Research on the Active DDoS Filtering Algorithm Based on IP Flow (Articles)
Rui GUO, Hao YIN, Dongqi WANG, Bencheng ZHANG
Int'l J. of Communications, Network and System Sciences Vol.2 No.7,October 20, 2009
DOI: 10.4236/ijcns.2009.27067 6,086 Downloads 10,578 Views Citations
Match Analysis in a University Taekwondo Championship (Articles)
Coral Falco, Raul Landeo, Cristina Menescardi, José Luis Bermejo, Isaac Estevan
Advances in Physical Education Vol.2 No.1,February 16, 2012
DOI: 10.4236/ape.2012.21005 6,262 Downloads 14,430 Views Citations
Kite Modeling for Higher Altitude Wind Energy (Articles)
Hong Zhang
Energy and Power Engineering Vol.5 No.7,September 18, 2013
DOI: 10.4236/epe.2013.57052 6,567 Downloads 9,174 Views Citations
A review on periodontitis versus endodontics (Review)
Mohammad Salarpour, Mahsa Bamadi, Elaheh Salarpour, Masood Bamadi
Health Vol.5 No.11,November 12, 2013
DOI: 10.4236/health.2013.511243 3,262 Downloads 4,539 Views Citations
A Survey of SQL Injection Attack Detection and Prevention (Articles)
Khaled Elshazly, Yasser Fouad, Mohamed Saleh, Adel Sewisy
Journal of Computer and Communications Vol.2 No.8,June 4, 2014
DOI: 10.4236/jcc.2014.28001 5,528 Downloads 9,085 Views Citations
Efficient Selfish Attack Detection in Cognitive Radio Network (Articles)
Shailaja C. Patil, Amrita Janardhanan
Wireless Engineering and Technology Vol.7 No.4,October 21, 2016
DOI: 10.4236/wet.2016.74011 1,420 Downloads 2,267 Views Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials (Articles)
Tatiana L. Ávalos-Rendón, Carlos Javier Mendoza
Materials Sciences and Applications Vol.8 No.2,February 6, 2017
DOI: 10.4236/msa.2017.82008 1,624 Downloads 2,543 Views Citations
Posttraumatic Stress Disorder Mediated by Exposure Level in French Civil Firefighters Following a Terrorist Attack: Some Hypotheses towards a Structural Model (Articles)
Angelika Wolman, Jean-Marie Stève, Marion Samor, Evelyne Bouteyre, Themistoklis Apostolidis, Abdessadek El Ahmadi
World Journal of Neuroscience Vol.10 No.3,August 6, 2020
DOI: 10.4236/wjns.2020.103014 107 Downloads 245 Views Citations
Studies on Chemical Resistance of PET-Mortar Composites: Microstructure and Phase Composition Changes (Articles)
Ahmed Soufiane Benosman, Mohamed Mouli, Hamed Taibi, Mohamed Belbachir, Yassine Senhadji, Ilies Bahlouli, David Houivet
Engineering Vol.5 No.4,April 29, 2013
DOI: 10.4236/eng.2013.54049 5,592 Downloads 8,438 Views Citations