Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Calcium Affects on Vascular Endpoints (CAVE) Retrospective Cohort Trial
(Articles)
Rajib K. Bhattacharya
,
Vaishali B. Patel
,
James L. Vacek
Open Journal of Endocrine and Metabolic Diseases
Vol.3 No.1
,February 26, 2013
DOI:
10.4236/ojemd.2013.31012
3,407
Downloads
5,851
Views
Citations
Integrate Liveness Detection with Iris Verification to Construct Support Biometric System
(Articles)
Hanaa Mohsin Ahmad
,
Bushra Jabbar Abdulkareem
Journal of Computer and Communications
Vol.4 No.1
,January 26, 2016
DOI:
10.4236/jcc.2016.41003
4,984
Downloads
5,989
Views
Citations
Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes
(Articles)
Ashraf Al Sharah
,
Taiwo Oyedare
,
Sachin Shetty
Communications and Network
Vol.8 No.2
,March 31, 2016
DOI:
10.4236/cn.2016.82007
2,914
Downloads
3,684
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,844
Downloads
3,651
Views
Citations
RETRACTED: Isolating Wormhole Attack in Wireless Sensor Networks
(Articles)
L. Thanga Mariappan
,
K. Rubasoundar
Circuits and Systems
Vol.7 No.8
,June 29, 2016
DOI:
10.4236/cs.2016.78177
1,480
Downloads
2,540
Views
Citations
A Novel Review on Security and Routing Protocols in MANET
(Articles)
Muhammad Kashif Nazir
,
Rameez U. Rehman
,
Atif Nazir
Communications and Network
Vol.8 No.4
,September 22, 2016
DOI:
10.4236/cn.2016.84020
2,292
Downloads
5,502
Views
Citations
Practical Approaches to Securing an IT Environment
(Articles)
Emmanuel S. Kolawole
,
Warsame H. Ali
,
Cofie Penrose
,
John C. Fuller
Communications and Network
Vol.9 No.4
,November 30, 2017
DOI:
10.4236/cn.2017.94019
1,880
Downloads
5,300
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
980
Downloads
2,130
Views
Citations
E-Fraud in Nigerian Banks: Why and How?
(Articles)
Babatunde Moses Ololade
,
Mary Kehinde Salawu
,
Aderemi Daniel Adekanmi
Journal of Financial Risk Management
Vol.9 No.3
,September 10, 2020
DOI:
10.4236/jfrm.2020.93012
945
Downloads
7,655
Views
Citations
Comparative Theoretical Studies of the Reactivity and Stability of Selected Groups of Isomers with Carbon-Oxygen and Carbon-Nitrogen Bonds
(Articles)
Issofa Patouossa
,
Eric N. Njabon
,
Alphonse Emadak
,
Naomi Zshika
Computational Chemistry
Vol.9 No.2
,April 30, 2021
DOI:
10.4236/cc.2021.92007
318
Downloads
852
Views
Citations
Security and Privacy Concerns over IoT Devices Attacks in Smart Cities (2022)
(Articles)
Azizi Majid
Journal of Computer and Communications
Vol.11 No.1
,January 20, 2023
DOI:
10.4236/jcc.2023.111003
250
Downloads
2,249
Views
Citations
Impact of Domestic Terrorism on Economy: A Literature Review
(Articles)
Robb Shawe
,
Ian R. McAndrew
iBusiness
Vol.15 No.1
,March 29, 2023
DOI:
10.4236/ib.2023.151006
181
Downloads
1,645
Views
Citations
Psychiatry in a War Situation:
In Situ
Therapeutic Approach to an Attack Case of Ber, Timbuktu in Mali
(Articles)
Kokou Messanh Agbémélé Soedje
,
Guy Gerard Aza-Gnandji
,
Damega Wenkourama
,
Tchédié Etdéchié Elvyreklikpo
,
Koffi Mawussé Mensah
,
Adjaré-Kamé Fidèle Ahara
,
Solo Conde
,
Koffi Djotepe Soedje
,
Kolou Simliwa Dassa
Open Journal of Psychiatry
Vol.13 No.4
,October 25, 2023
DOI:
10.4236/ojpsych.2023.134026
70
Downloads
253
Views
Citations
Epidemio-Clinical Profile of Psychotrauma in Military Victims of Terrorists Attacks in Benin in December 2021
(Articles)
Guy-Gérard Aza-Gnandji
,
David Sinet Koivogui
,
Kokou Messanh Agbémèlé Soedje
,
Tchedié Etdéchié Elvyre Klikpo
,
Josiane Ezin Houngbe
Open Journal of Psychiatry
Vol.13 No.6
,December 26, 2023
DOI:
10.4236/ojpsych.2023.136036
57
Downloads
169
Views
Citations
This article belongs to the Special Issue on
Schizophrenia
Hybrid Authentication Cybersystem Based on Discrete Logarithm, Factorization and Array Entanglements
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37077
4,899
Downloads
8,372
Views
Citations
The Guidelines to Adopt an Applicable SIEM Solution
(Articles)
Hassan Mokalled
,
Rosario Catelli
,
Valentina Casola
,
Daniele Debertol
,
Ermete Meda
,
Rodolfo Zunino
Journal of Information Security
Vol.11 No.1
,December 13, 2019
DOI:
10.4236/jis.2020.111003
1,849
Downloads
4,404
Views
Citations
Case Study of a Cyber-Physical Attack Affecting Port and Ship Operational Safety
(Articles)
Kimberly Tam
,
Rory Hopcraft
,
Kemedi Moara-Nkwe
,
Juan Palbar Misas
,
Wesley Andrews
,
Avanthika Vineetha Harish
,
Pablo Giménez
,
Tom Crichton
,
Kevin Jones
Journal of Transportation Technologies
Vol.12 No.1
,December 6, 2021
DOI:
10.4236/jtts.2022.121001
523
Downloads
4,301
Views
Citations
Towards the Advancement of Cashless Transaction: A Security Analysis of Electronic Payment Systems
(Articles)
Iffath Tanjim Moon
,
Muhammad Shamsuzzaman
,
Muhammad Musfiqur Rahman Mridha
,
Abu Sayed Md. Mostafizur Rahaman
Journal of Computer and Communications
Vol.10 No.7
,July 29, 2022
DOI:
10.4236/jcc.2022.107007
459
Downloads
4,141
Views
Citations
Taming the Shrew of Rising Cyber-Warfare
(Articles)
Festus C. Obi
,
Alaba M. Oludare
Open Access Library Journal
Vol.9 No.12
,December 28, 2022
DOI:
10.4236/oalib.1109003
58
Downloads
484
Views
Citations
The Knowledge of Cyber-Security Vulnerabilities in an Institution of Higher and University Education. A Case of ISP-Bukavu (Institut Supérieur Pédagogique de Bukavu) (TTC = Teachers’ Training College)
(Articles)
Dominique Wasso Kiseki
,
Vincent Havyarimana
,
Therence Niyonsaba
,
Désiré Lumonge Zabagunda
,
Walumbuka Ilundu Wail
,
Thabo Semong
Journal of Computer and Communications
Vol.11 No.4
,April 24, 2023
DOI:
10.4236/jcc.2023.114002
100
Downloads
461
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top