Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Response to Arbitrarily Bandlimited Gaussian Noise of the Complex Stretch Processor Using a Conventional Range-Sidelobe-Reduction Window
(Articles)
John N. Spitzmiller
Journal of Signal and Information Processing
Vol.9 No.1
,February 13, 2018
DOI:
10.4236/jsip.2018.91003
971
Downloads
1,754
Views
Citations
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment
(Articles)
Sanjeev Kumar
,
Orifiel Gomez
Journal of Information Security
Vol.1 No.2
,October 29, 2010
DOI:
10.4236/jis.2010.12010
11,523
Downloads
20,928
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,308
Downloads
7,161
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,374
Downloads
2,990
Views
Citations
Research on the Active DDoS Filtering Algorithm Based on IP Flow
(Articles)
Rui GUO
,
Hao YIN
,
Dongqi WANG
,
Bencheng ZHANG
Int'l J. of Communications, Network and System Sciences
Vol.2 No.7
,October 20, 2009
DOI:
10.4236/ijcns.2009.27067
6,589
Downloads
11,719
Views
Citations
Match Analysis in a University Taekwondo Championship
(Articles)
Coral Falco
,
Raul Landeo
,
Cristina Menescardi
,
José Luis Bermejo
,
Isaac Estevan
Advances in Physical Education
Vol.2 No.1
,February 16, 2012
DOI:
10.4236/ape.2012.21005
7,720
Downloads
16,884
Views
Citations
Kite Modeling for Higher Altitude Wind Energy
(Articles)
Hong Zhang
Energy and Power Engineering
Vol.5 No.7
,September 18, 2013
DOI:
10.4236/epe.2013.57052
8,061
Downloads
11,548
Views
Citations
A review on periodontitis versus endodontics
(Review)
Mohammad Salarpour
,
Mahsa Bamadi
,
Elaheh Salarpour
,
Masood Bamadi
Health
Vol.5 No.11
,November 12, 2013
DOI:
10.4236/health.2013.511243
3,724
Downloads
5,523
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,541
Downloads
13,204
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,782
Downloads
3,246
Views
Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials
(Articles)
Tatiana L. Ávalos-Rendón
,
Carlos Javier Mendoza
Materials Sciences and Applications
Vol.8 No.2
,February 6, 2017
DOI:
10.4236/msa.2017.82008
2,083
Downloads
4,023
Views
Citations
Improvements in a Puzzle Authentication Method
(Articles)
Yutaka Hirakawa
,
Ayaka Shimoda
,
Isao Sasano
,
Kazuo Ohzeki
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61002
762
Downloads
2,025
Views
Citations
Posttraumatic Stress Disorder Mediated by Exposure Level in French Civil Firefighters Following a Terrorist Attack: Some Hypotheses towards a Structural Model
(Articles)
Angelika Wolman
,
Jean-Marie Stève
,
Marion Samor
,
Evelyne Bouteyre
,
Themistoklis Apostolidis
,
Abdessadek El Ahmadi
World Journal of Neuroscience
Vol.10 No.3
,August 6, 2020
DOI:
10.4236/wjns.2020.103014
547
Downloads
1,354
Views
Citations
Measuring the Impact of DoS Attack on Availability: Empirical Study Based on Accessibility
(Articles)
Suhail Qadir
,
Uzair Bashir
Journal of Information Security
Vol.13 No.2
,April 11, 2022
DOI:
10.4236/jis.2022.132004
412
Downloads
1,634
Views
Citations
Generalized Anxiety Disorder: A Review of Current Literature in Saudi Arabia
(Articles)
Omar Abdulqader Bamalan
,
Nader Mohammed Alosaimi
,
Abdulrahman Abdulrazzaq Alfryyan
,
Hussain Jawad Aljubran
,
Faris Hamoud Alanazi
,
Zaheenul Islam Siddiqui
Psychology
Vol.14 No.1
,January 31, 2023
DOI:
10.4236/psych.2023.141003
447
Downloads
3,419
Views
Citations
This article belongs to the Special Issue on
Depression and Anxiety
COVID-19 and Cardiovascular Disease—Two Pandemics, One Success
(Articles)
Robert Philip Eaton
,
Barry Ramo
,
Martin Hickey
,
David S. Schade
World Journal of Cardiovascular Diseases
Vol.13 No.4
,April 28, 2023
DOI:
10.4236/wjcd.2023.134021
126
Downloads
717
Views
Citations
Anesthetic and Obstetric Considerations of Moyamoya Disease in Pregnancy after Intracranial Bypass Grafting: A Case Report and Literature Review
(Case Report)
Dennerd Ovando Jr.
,
Arit Ntekim
,
Ming Xiong
Open Journal of Anesthesiology
Vol.13 No.5
,May 15, 2023
DOI:
10.4236/ojanes.2023.135010
149
Downloads
846
Views
Citations
Studies on Chemical Resistance of PET-Mortar Composites: Microstructure and Phase Composition Changes
(Articles)
Ahmed Soufiane Benosman
,
Mohamed Mouli
,
Hamed Taibi
,
Mohamed Belbachir
,
Yassine Senhadji
,
Ilies Bahlouli
,
David Houivet
Engineering
Vol.5 No.4
,April 29, 2013
DOI:
10.4236/eng.2013.54049
7,709
Downloads
11,225
Views
Citations
Timing Attack Analysis on AA
β
Cryptosystem
(Articles)
A. H. A. Ghafar
,
M. R. K. Ariffin
Journal of Computer and Communications
Vol.2 No.4
,March 17, 2014
DOI:
10.4236/jcc.2014.24001
3,562
Downloads
5,230
Views
Citations
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
(Articles)
Ghazi Al Sukkar
,
Ramzi Saifan
,
Sufian Khwaldeh
,
Mahmoud Maqableh
,
Iyad Jafar
Communications and Network
Vol.8 No.3
,July 14, 2016
DOI:
10.4236/cn.2016.83012
3,861
Downloads
9,644
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top