Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Effect of Silver-Plating Time on Silicon Nanowires Arrays Fabricated by Wet Chemical Etching Method
(Articles)
Shanshan Wang
,
Jun Han
,
Shujing Yin
Optics and Photonics Journal
Vol.9 No.8B
,August 9, 2019
DOI:
10.4236/opj.2019.98B001
583
Downloads
1,521
Views
Citations
Designing a Software Performance Engineering Laboratory
(Articles)
Wasim Haque
Journal of Software Engineering and Applications
Vol.18 No.3
,March 20, 2025
DOI:
10.4236/jsea.2025.183006
46
Downloads
244
Views
Citations
The Performance Analysis of Multi-Layer Split-Protocol
(Articles)
Bharat S. Rawal
Journal of Computer and Communications
Vol.6 No.9
,September 21, 2018
DOI:
10.4236/jcc.2018.69008
797
Downloads
2,248
Views
Citations
Performance and Availability Evaluation of Big Data Environments in the Private Cloud
(Articles)
Tarcísio Rolim
,
Erica Sousa
Journal of Computer and Communications
Vol.12 No.12
,December 31, 2024
DOI:
10.4236/jcc.2024.1212015
41
Downloads
205
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,124
Downloads
6,932
Views
Citations
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
,November 1, 2023
DOI:
10.4236/jdaip.2023.114019
163
Downloads
775
Views
Citations
Security Concerns with IoT Routing: A Review of Attacks, Countermeasures, and Future Prospects
(Articles)
Ali M. A. Abuagoub
Advances in Internet of Things
Vol.14 No.4
,October 14, 2024
DOI:
10.4236/ait.2024.144005
117
Downloads
702
Views
Citations
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
(Articles)
Richard Kabanda
,
Bertrand Byera
,
Henrietta Emeka
,
Khaja Taiyab Mohiuddin
Journal of Information Security
Vol.14 No.4
,October 27, 2023
DOI:
10.4236/jis.2023.144026
292
Downloads
1,950
Views
Citations
Temperature-Profile/Lapse-Rate Feedback: A Misunderstood Feedback of the Climate System
(Articles)
Michael E. Schlesinger
,
C. Bruce Entwistle
,
Bin Li
Atmospheric and Climate Sciences
Vol.2 No.4
,November 2, 2012
DOI:
10.4236/acs.2012.24041
4,392
Downloads
8,148
Views
Citations
Carnap Ponders Canberra: Creating a Theory of Meaning Based on Carnap’s Criteria of Cognitive Significance and the Canberra Plan
(Articles)
Andrew Whiteley Magrath
Open Journal of Philosophy
Vol.3 No.3
,August 5, 2013
DOI:
10.4236/ojpp.2013.33063
3,663
Downloads
5,007
Views
Citations
Information Theoretic Distinguishers for Timing Attacks with Partial Profiles: Solving the Empty Bin Issue
(Articles)
Eloi De Chérisey
,
Sylvain Guilley
,
Olivier Rioul
,
Darshana Jayasinghe
Journal of Information Security
Vol.12 No.1
,December 10, 2020
DOI:
10.4236/jis.2021.121001
451
Downloads
1,078
Views
Citations
Trace Determination of Tamoxifen in Biological Fluids Using Hollow Fiber Liquid-Phase Microextraction Followed by High-Performance Liquid Chromatography-Ultraviolet Detection
(Articles)
Amir Kashtiaray
,
Hadi Farahani
,
Sharareh Farhadi
,
Bertrand Rochat
,
Hamid Reza Sobhi
American Journal of Analytical Chemistry
Vol.2 No.4
,August 3, 2011
DOI:
10.4236/ajac.2011.24052
5,470
Downloads
11,006
Views
Citations
A Comparative Analysis of Tools for Verification of Security Protocols
(Articles)
Nitish Dalal
,
Jenny Shah
,
Khushboo Hisaria
,
Devesh Jinwala
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310104
7,892
Downloads
16,373
Views
Citations
A One-Session Treatment Protocol for Panic Attacks
(Articles)
Ron Robbins
,
Jan Parker
,
Charles Tatum
Psychology
Vol.6 No.9
,July 6, 2015
DOI:
10.4236/psych.2015.69103
4,506
Downloads
7,853
Views
Citations
Toward Secure Vehicular Ad Hoc Networks an Overview and Comparative Study
(Articles)
Yousef Al-Raba’nah
,
Mohammed Al-Refai
Journal of Computer and Communications
Vol.4 No.16
,December 9, 2016
DOI:
10.4236/jcc.2016.416002
2,140
Downloads
4,276
Views
Citations
Scalable Distributed File Sharing System: A Robust Strategy for a Reliable Networked Environment in Tertiary Institutions
(Articles)
Emmanuel N. Ekwonwune
,
Bright U. Ezeoha
Int'l J. of Communications, Network and System Sciences
Vol.12 No.4
,April 30, 2019
DOI:
10.4236/ijcns.2019.124005
925
Downloads
2,490
Views
Citations
The Differentiation of Phonological and Morphological Intrusion for the Two-Dimensional Orthography
(Articles)
Yang Lee
,
Claudia Carello
Psychology
Vol.7 No.9
,August 9, 2016
DOI:
10.4236/psych.2016.79123
2,104
Downloads
3,875
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
440
Downloads
2,253
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Interrater Reliability Estimation via Maximum Likelihood for Gwet’s Chance Agreement Model
(Articles)
Alek M. Westover
,
Tara M. Westover
,
M. Brandon Westover
Open Journal of Statistics
Vol.14 No.5
,October 28, 2024
DOI:
10.4236/ojs.2024.145021
46
Downloads
297
Views
Citations
Qualitative and Quantitative Analysis of Five Bioactive Flavonoids in
Salix bordensis
Turcz. by HPLC-DAD and HPLC-ESI-MS
(Articles)
Lei Zhao
,
Lina Liu
,
Jintian Li
American Journal of Analytical Chemistry
Vol.5 No.13
,September 19, 2014
DOI:
10.4236/ajac.2014.513094
4,493
Downloads
5,802
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top