Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
TCP Window Based Congestion Control -Slow-Start Approach
(Articles)
Kolawole I. Oyeyinka
,
Ayodeji O. Oluwatope
,
Adio. T. Akinwale
,
Olusegun Folorunso
,
Ganiyu A. Aderounmu
,
Olatunde O. Abiona
Communications and Network
Vol.3 No.2
,May 19, 2011
DOI:
10.4236/cn.2011.32011
8,776
Downloads
17,414
Views
Citations
Buffer Occupancy of Double-Buffer Traffic Shaper in Real-Time Multimedia Applications across Slow-Speed Links
(Articles)
Ayodeji O. Oluwatope
,
Damilola T. Oyewo
,
Folake E. Olayiwola
,
Ganiyu A. Aderounmu
,
Emmanuel A. Adagunodo
Communications and Network
Vol.5 No.1
,February 27, 2013
DOI:
10.4236/cn.2013.51008
4,181
Downloads
6,918
Views
Citations
Comparative Analysis of TCP-Protocol Operation Algorithms in Self-Similar Traffic
(Articles)
Abed Saif Alghawli
Communications and Network
Vol.5 No.2
,May 10, 2013
DOI:
10.4236/cn.2013.52016
5,895
Downloads
8,304
Views
Citations
Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes
(Articles)
Ahmed Refaey
,
Weikun Hou
,
Khaled Loukhaoukha
Journal of Computer and Communications
Vol.2 No.8
,June 26, 2014
DOI:
10.4236/jcc.2014.28007
2,514
Downloads
3,637
Views
Citations
On the Nonequilibrium of Radiation-Induced Bystander Effects in Tumor Surface and Its Implications in Radiation Therapy
(Articles)
R. Vaitheeswaran
,
K. J. Maria Das
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.4 No.3
,July 22, 2015
DOI:
10.4236/ijmpcero.2015.43025
2,688
Downloads
3,453
Views
Citations
Delay Resistant Transport Protocol for Deep Space Communication
(Articles)
Mohanchur Sarkar
,
Kaushal K. Shukla
,
Kankar S. Dasgupta
Int'l J. of Communications, Network and System Sciences
Vol.4 No.2
,February 26, 2011
DOI:
10.4236/ijcns.2011.42015
4,926
Downloads
9,590
Views
Citations
The Emergence of “Syn-Epistemic Wholeness” from Dialectic Synergy of Disciplines: A Transdisciplinary Social Pedagogic Model
(Articles)
Iro Mylonakou-Keke
Creative Education
Vol.6 No.17
,October 27, 2015
DOI:
10.4236/ce.2015.617195
3,029
Downloads
4,354
Views
Citations
This article belongs to the Special Issue on
Interdisciplinarity in Education
Catalyst Free One-Pot Synthesis of Chromeno Quinolines and Their Antibacterial Activity
(Articles)
Sruthi Vasamsetty
,
Sunitha Medidi
,
Satheesh Ampolu
,
Ravi Kumar Majji
,
Mastan Rao Kotupalli
,
Chikurumilli China Satyanarayana
,
Annapurna Nowduri
,
Paul Douglas Sanasi
Green and Sustainable Chemistry
Vol.7 No.2
,May 22, 2017
DOI:
10.4236/gsc.2017.72011
1,600
Downloads
2,909
Views
Citations
DDoS Attack Detection Using Heuristics Clustering Algorithm and Naïve Bayes Classification
(Articles)
Sharmila Bista
,
Roshan Chitrakar
Journal of Information Security
Vol.9 No.1
,December 20, 2017
DOI:
10.4236/jis.2018.91004
1,603
Downloads
3,911
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
A Survey of Cloud Computing Detection Techniques against DDoS Attacks
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.1
,December 21, 2017
DOI:
10.4236/jis.2018.91005
2,390
Downloads
6,995
Views
Citations
This article belongs to the Special Issue on
Intrusion Detection and Prevention
Generation of DDoS Attack Dataset for Effective IDS Development and Evaluation
(Articles)
Sabah Alzahrani
,
Liang Hong
Journal of Information Security
Vol.9 No.4
,August 16, 2018
DOI:
10.4236/jis.2018.94016
3,757
Downloads
8,966
Views
Citations
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks
(Articles)
Rodolfo Baez Junior
,
Sanjeev Kumar
Journal of Information Security
Vol.5 No.3
,July 24, 2014
DOI:
10.4236/jis.2014.53012
5,208
Downloads
6,899
Views
Citations
Generalized Attack Model for Networked Control Systems, Evaluation of Control Methods
(Articles)
Arman Sargolzaei
,
Kang Yen
,
Mohamed Abdelghani
,
Alireza Abbaspour
,
Saman Sargolzaei
Intelligent Control and Automation
Vol.8 No.3
,August 23, 2017
DOI:
10.4236/ica.2017.83013
1,300
Downloads
2,741
Views
Citations
Match Analysis in a University Taekwondo Championship
(Articles)
Coral Falco
,
Raul Landeo
,
Cristina Menescardi
,
José Luis Bermejo
,
Isaac Estevan
Advances in Physical Education
Vol.2 No.1
,February 16, 2012
DOI:
10.4236/ape.2012.21005
7,447
Downloads
16,364
Views
Citations
Kite Modeling for Higher Altitude Wind Energy
(Articles)
Hong Zhang
Energy and Power Engineering
Vol.5 No.7
,September 18, 2013
DOI:
10.4236/epe.2013.57052
7,817
Downloads
11,047
Views
Citations
A review on periodontitis versus endodontics
(Review)
Mohammad Salarpour
,
Mahsa Bamadi
,
Elaheh Salarpour
,
Masood Bamadi
Health
Vol.5 No.11
,November 12, 2013
DOI:
10.4236/health.2013.511243
3,619
Downloads
5,221
Views
Citations
A Survey of SQL Injection Attack Detection and Prevention
(Articles)
Khaled Elshazly
,
Yasser Fouad
,
Mohamed Saleh
,
Adel Sewisy
Journal of Computer and Communications
Vol.2 No.8
,June 4, 2014
DOI:
10.4236/jcc.2014.28001
7,242
Downloads
12,170
Views
Citations
Efficient Selfish Attack Detection in Cognitive Radio Network
(Articles)
Shailaja C. Patil
,
Amrita Janardhanan
Wireless Engineering and Technology
Vol.7 No.4
,October 21, 2016
DOI:
10.4236/wet.2016.74011
1,723
Downloads
3,073
Views
Citations
Study on the Expansion of a Cement-Based System Containing Sap Polymer and Supplementary Cementing Materials
(Articles)
Tatiana L. Ávalos-Rendón
,
Carlos Javier Mendoza
Materials Sciences and Applications
Vol.8 No.2
,February 6, 2017
DOI:
10.4236/msa.2017.82008
1,998
Downloads
3,741
Views
Citations
Improvements in a Puzzle Authentication Method
(Articles)
Yutaka Hirakawa
,
Ayaka Shimoda
,
Isao Sasano
,
Kazuo Ohzeki
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61002
712
Downloads
1,783
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top