Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Secure DHCP Protocol to Mitigate LAN Attacks
(Articles)
Osama S. Younes
Journal of Computer and Communications
Vol.4 No.1
,January 28, 2016
DOI:
10.4236/jcc.2016.41005
6,033
Downloads
11,759
Views
Citations
Template Matching from 2-D into 1-D
(Articles)
Yasser Fouda
Journal of Signal and Information Processing
Vol.5 No.2
,May 2, 2014
DOI:
10.4236/jsip.2014.52005
7,015
Downloads
12,859
Views
Citations
Mothers’ Knowledge Regarding Preventive Measures of Food Poisoning in Yemen
(Articles)
Waled Amen Mohammed Ahmed
Food and Nutrition Sciences
Vol.6 No.1
,January 12, 2015
DOI:
10.4236/fns.2015.61006
3,873
Downloads
5,384
Views
Citations
Synthesis and Characterization of a Metal-Organic Framework Bridged by Long Flexible Ligand
(Articles)
Kawther Osman Ashiry
,
Rasha Khalid Abbas
Open Journal of Polymer Chemistry
Vol.11 No.1
,February 26, 2021
DOI:
10.4236/ojpchem.2021.111001
565
Downloads
1,644
Views
Citations
A Review of Gaps between Usability and Security/Privacy
(Articles)
Majed Alshamari
Int'l J. of Communications, Network and System Sciences
Vol.9 No.10
,October 25, 2016
DOI:
10.4236/ijcns.2016.910034
2,251
Downloads
6,119
Views
Citations
Study of Similarity Measures with Linear Discriminant Analysis for Face Recognition
(Articles)
Mohamed A. El-Sayed
,
Kadry Hamed
Journal of Software Engineering and Applications
Vol.8 No.9
,September 16, 2015
DOI:
10.4236/jsea.2015.89046
7,106
Downloads
8,191
Views
Citations
Public Key Infrastructure: A Survey
(Articles)
Aysha Albarqi
,
Ethar Alzaid
,
Fatimah Al Ghamdi
,
Somaya Asiri
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 8, 2015
DOI:
10.4236/jis.2015.61004
5,770
Downloads
9,318
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,622
Downloads
7,240
Views
Citations
An Enhanced Dragonfly Key Exchange Protocol against Offline Dictionary Attack
(Articles)
Eman Alharbi
,
Noha Alsulami
,
Omar Batarfi
Journal of Information Security
Vol.6 No.2
,March 12, 2015
DOI:
10.4236/jis.2015.62008
4,700
Downloads
6,186
Views
Citations
A Hybrid ANN-GWO Algorithm for Prediction of Heart Disease
(Articles)
Hamza Turabieh
American Journal of Operations Research
Vol.6 No.2
,March 8, 2016
DOI:
10.4236/ajor.2016.62016
3,725
Downloads
6,502
Views
Citations
Security and Privacy Challenges in Cyber-Physical Systems
(Articles)
Fahd AlDosari
Journal of Information Security
Vol.8 No.4
,October 13, 2017
DOI:
10.4236/jis.2017.84019
2,343
Downloads
7,079
Views
Citations
A Practical Comparison between Signature Approach and Other Existing Approaches in Error Detection over TCP
(Articles)
Mohammed J. Bawaneh
,
Mahmud S. Alkoffash
,
Shihadeh Alqrainy
,
Hasan Muaidi
Communications and Network
Vol.8 No.1
,February 29, 2016
DOI:
10.4236/cn.2016.81004
2,674
Downloads
3,521
Views
Citations
Conventional and Improved Digital Signature Scheme: A Comparative Study
(Articles)
Alaa D. Alrehily
,
Asmaa F. Alotaibi
,
Suzan B. Almutairy
,
Mashael S. Alqhtani
,
Jayaprakash Kar
Journal of Information Security
Vol.6 No.1
,January 22, 2015
DOI:
10.4236/jis.2015.61007
6,057
Downloads
7,926
Views
Citations
A Short Review of Classification Algorithms Accuracy for Data Prediction in Data Mining Applications
(Articles)
Ibrahim Ba’abbad
,
Thamer Althubiti
,
Abdulmohsen Alharbi
,
Khalid Alfarsi
,
Saim Rasheed
Journal of Data Analysis and Information Processing
Vol.9 No.3
,August 18, 2021
DOI:
10.4236/jdaip.2021.93011
589
Downloads
3,380
Views
Citations
SemSignWriting: A Proposed Semantic System for Arabic Text-to-SignWriting Translation
(Articles)
Ameera M. Almasoud
,
Hend S. Al-Khalifa
Journal of Software Engineering and Applications
Vol.5 No.8
,August 28, 2012
DOI:
10.4236/jsea.2012.58069
5,370
Downloads
8,564
Views
Citations
A Multi-Resolution Photogrammetric Framework for Digital Geometric Recording of Large Archeological Sites: Ajloun Castle-Jordan
(Articles)
A’kif Al-Fugara
,
Rida Al-Adamat
,
Yahya Al-Shawabkeh
,
Omar Al-Kour
,
Abdel Rahman Al-Shabeeb
International Journal of Geosciences
Vol.7 No.3
,March 31, 2016
DOI:
10.4236/ijg.2016.73033
3,309
Downloads
4,888
Views
Citations
Structure of Groups with Generalized Normal Subgroups
(Articles)
Mohammad Arshaduzzaman
Advances in Pure Mathematics
Vol.4 No.6
,June 13, 2014
DOI:
10.4236/apm.2014.46035
6,289
Downloads
7,898
Views
Citations
Soil Microbial Biomass of Pea (
Pisium sativum
cv. Little Marvel) in Response to Three Atmospheric Air Regimes at Al Baha Region, KSA
(Articles)
Abdulaziz Yahya Al-Ghamdi
American Journal of Climate Change
Vol.6 No.4
,November 30, 2017
DOI:
10.4236/ajcc.2017.64031
583
Downloads
1,154
Views
Citations
A Comparison of Four Methods of Estimating the Scale Parameter for the Exponential Distribution
(Articles)
Huda M. Alomari
Journal of Applied Mathematics and Physics
Vol.11 No.10
,October 19, 2023
DOI:
10.4236/jamp.2023.1110186
52
Downloads
259
Views
Citations
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
(Articles)
Mohammed J. Bawaneh
,
Atef A. Obeidat
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73011
3,826
Downloads
6,198
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top