Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Average Power Reduction Method for Web Applications on Wireless Terminals
(Articles)
Toshiya Koyasu
,
Hideki Shimada
,
Kenya Sato
Communications and Network
Vol.4 No.2
,May 18, 2012
DOI:
10.4236/cn.2012.42018
4,684
Downloads
7,824
Views
Citations
LDAP Injection Techniques
(Articles)
Jose Maria ALONSO
,
Antonio GUZMAN
,
Marta BELTRAN
,
Rodolfo BORDON
Wireless Sensor Network
Vol.1 No.4
,November 20, 2009
DOI:
10.4236/wsn.2009.14030
11,302
Downloads
18,254
Views
Citations
Systematic Review of Web Application Security Vulnerabilities Detection Methods
(Articles)
Sajjad Rafique
,
Mamoona Humayun
,
Zartasha Gul
,
Ansar Abbas
,
Hasan Javed
Journal of Computer and Communications
Vol.3 No.9
,September 15, 2015
DOI:
10.4236/jcc.2015.39004
7,865
Downloads
12,953
Views
Citations
Web Threats Detection and Prevention Framework
(Articles)
Osama M. Rababah
,
Ahmad K. Al Hwaitat
,
Saher Al Manaseer
,
Hussam N. Fakhouri
,
Rula Halaseh
Communications and Network
Vol.8 No.3
,August 4, 2016
DOI:
10.4236/cn.2016.83017
2,269
Downloads
3,542
Views
Citations
Secure Web Application Technologies Implementation through Hardening Security Headers Using Automated Threat Modelling Techniques
(Articles)
Maduhu Mshangi Mlyatu
,
Camilius Sanga
Journal of Information Security
Vol.14 No.1
,November 30, 2022
DOI:
10.4236/jis.2023.141001
303
Downloads
1,554
Views
Citations
Transformation of User Interface to Activity Models and Assessing Performance of WA/WS
(Articles)
Ch. Ram Mohan Reddy
,
D. Evangelin Geetha
,
R. V. Raghvendra Rao
,
T. V. Suresh Kumar
Journal of Software Engineering and Applications
Vol.12 No.5
,May 23, 2019
DOI:
10.4236/jsea.2019.125008
939
Downloads
2,551
Views
Citations
Security Engineering of SOA Applications Via Reliability Patterns
(Articles)
Luigi Coppolino
,
Luigi Romano
,
Valerio Vianello
Journal of Software Engineering and Applications
Vol.4 No.1
,January 27, 2011
DOI:
10.4236/jsea.2011.41001
5,931
Downloads
11,101
Views
Citations
Bridge the Gap—Incorporating Classroom Response Systems for Classroom-Embedded Formative Assessment
(Articles)
Weihua Shi
,
Jace Hargis
Open Access Library Journal
Vol.10 No.2
,February 27, 2023
DOI:
10.4236/oalib.1109829
162
Downloads
1,155
Views
Citations
Securing Stock Transactions Using Blockchain Technology: Architecture for Identifying and Reducing Vulnerabilities Linked to the Web Applications Used (MAHV-BC)
(Articles)
Kpinna Tiekoura Coulibaly
,
Abdou Maïga
,
Jerome Diako
,
Moustapha Diaby
Open Journal of Applied Sciences
Vol.13 No.11
,November 28, 2023
DOI:
10.4236/ojapps.2023.1311163
124
Downloads
562
Views
Citations
An Introduction to RFID Technology
(Articles)
Sanjay Ahuja
,
Pavan Potti
Communications and Network
Vol.2 No.3
,September 10, 2010
DOI:
10.4236/cn.2010.23026
23,011
Downloads
39,482
Views
Citations
Services and Applications Based on Mobile User’s Location Detection and Prediction
(Articles)
M. Abo-Zahhad
,
Sabah M. Ahmed
,
M. Mourad
Int'l J. of Communications, Network and System Sciences
Vol.6 No.4
,April 17, 2013
DOI:
10.4236/ijcns.2013.64020
5,690
Downloads
9,155
Views
Citations
Smartphone Applications for the Radiologist
(Articles)
Hasanein Al-Hasani
,
Hamid Abboudi
,
Tishi Ninan
,
Behnam Shaygi
,
Carl Roobottom
Open Journal of Radiology
Vol.3 No.4
,December 31, 2013
DOI:
10.4236/ojrad.2013.34037
8,246
Downloads
12,360
Views
Citations
Nanomaterials for Sensor Applications
(Editorial)
Francisco Márquez
,
Carmen Morant
Soft Nanoscience Letters
Vol.5 No.1
,January 15, 2015
DOI:
10.4236/snl.2015.51001
7,217
Downloads
11,645
Views
Citations
Mobile Ad-Hoc Networks Applications and Its Challenges
(Articles)
Naeem Raza
,
Muhammad Umar Aftab
,
Muhammad Qasim Akbar
,
Omair Ashraf
,
Muhammad Irfan
Communications and Network
Vol.8 No.3
,July 20, 2016
DOI:
10.4236/cn.2016.83013
5,402
Downloads
28,668
Views
Citations
A Review of the Application of Nuclear Magnetic Resonance in Petroleum Industry
(Articles)
Ayorinde Janet Olaide
,
Ehinola Olugbenga
,
Durogbitan Abimbola
International Journal of Geosciences
Vol.11 No.4
,April 7, 2020
DOI:
10.4236/ijg.2020.114009
1,569
Downloads
5,811
Views
Citations
A Bayesian Regression Model and Applications
(Articles)
Yijun Yu
Journal of Applied Mathematics and Physics
Vol.8 No.9
,September 22, 2020
DOI:
10.4236/jamp.2020.89141
707
Downloads
2,015
Views
Citations
Learning Theory Principles for Psychotherapy
(Articles)
John R. Rossiter
Psychology
Vol.13 No.5
,May 27, 2022
DOI:
10.4236/psych.2022.135049
900
Downloads
5,215
Views
Citations
This article belongs to the Special Issue on
Psychotherapy Research
An Overview of NV Centers
(Articles)
Shuhan Guo
Journal of Applied Mathematics and Physics
Vol.11 No.11
,November 28, 2023
DOI:
10.4236/jamp.2023.1111231
519
Downloads
3,332
Views
Citations
Dynamic Service Discovery, Composition and Reconfiguration in a Model Mapping Business Process to Web Services
(Articles)
Zulqarnain Abdul Jabbar
,
Asia Samreen
Journal of Computer and Communications
Vol.4 No.9
,July 29, 2016
DOI:
10.4236/jcc.2016.49004
1,696
Downloads
2,711
Views
Citations
Applications of Norm and Situation Calculus in the Semantic Web Service Composition
(Articles)
Jun Zhao
,
Xiaozhu Gu
Journal of Software Engineering and Applications
Vol.3 No.8
,August 26, 2010
DOI:
10.4236/jsea.2010.38090
6,173
Downloads
9,702
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top