Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Self Umpiring System for Security in Wireless Mobile Ad Hoc Network
(Articles)
Ayyaswamy Kathirvel
,
Rengaramanujam Srinivasan
Wireless Sensor Network
Vol.2 No.3
,April 12, 2010
DOI:
10.4236/wsn.2010.23036
5,167
Downloads
9,543
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
,August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,751
Downloads
14,931
Views
Citations
SOAP-Based Security Interaction of Web Service inHeterogeneous Platforms
(Articles)
Tao Xu
,
Chunxiao Yi
Journal of Information Security
Vol.2 No.1
,February 17, 2011
DOI:
10.4236/jis.2011.21001
5,345
Downloads
10,090
Views
Citations
Secured Electronic Voting Protocol Using Biometric Authentication
(Articles)
Kalaichelvi Visvalingam
,
R. M. Chandrasekaran
Advances in Internet of Things
Vol.1 No.2
,July 26, 2011
DOI:
10.4236/ait.2011.12006
10,904
Downloads
24,752
Views
Citations
Characterization of Peaks and Valleys of Electricity Demand. Application to the Spanish Mainland System in the Period 2000-2020
(Articles)
Fermín Moreno
Energy and Power Engineering
Vol.3 No.4
,September 27, 2011
DOI:
10.4236/epe.2011.34066
5,608
Downloads
9,154
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
4,995
Downloads
8,477
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411084
4,881
Downloads
8,649
Views
Citations
Cyber-Physical-Social Based Security Architecture for Future Internet of Things
(Articles)
Huansheng Ning
,
Hong Liu
Advances in Internet of Things
Vol.2 No.1
,January 14, 2012
DOI:
10.4236/ait.2012.21001
14,103
Downloads
31,545
Views
Citations
Personnel Security outside the Box
(Articles)
Semyon Ioffe
,
Sergey Yesin
Psychology
Vol.3 No.2
,February 23, 2012
DOI:
10.4236/psych.2012.32031
5,432
Downloads
9,003
Views
Citations
A Simple Encryption Keys Creation Scheme in Wireless Ad Hoc Networks
(Articles)
Abdulrahman H. Altalhi
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41011
5,254
Downloads
9,031
Views
Citations
An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks
(Articles)
Benamar Kadri
,
Djilalli Moussaoui
,
Mohammed Feham
,
Abdellah Mhammed
Wireless Sensor Network
Vol.4 No.6
,June 13, 2012
DOI:
10.4236/wsn.2012.46022
5,554
Downloads
10,846
Views
Citations
A New Construction Scheme for Information Security Lab
(Articles)
Li Zhu
,
Huaqing Mao
,
Zhiwen Hu
Creative Education
Vol.3 No.4
,August 13, 2012
DOI:
10.4236/ce.2012.34064
5,121
Downloads
7,437
Views
Citations
High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption
(Articles)
Qassim Nasir
,
Hadi H. Abdlrudha
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9
,September 18, 2012
DOI:
10.4236/ijcns.2012.59065
5,472
Downloads
8,828
Views
Citations
Prevalence of psychiatric morbidity among inmates in Jos maximum security prison
(Articles)
Aishatu Y. Armiya’u
,
Ayodele Obembe
,
Moses D. Audu
,
Tolulope O. Afolaranmi
Open Journal of Psychiatry
Vol.3 No.1
,January 29, 2013
DOI:
10.4236/ojpsych.2013.31003
5,555
Downloads
9,576
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
16,117
Downloads
44,183
Views
Citations
Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks
(Articles)
Hangxia Zhou
,
Qian Liu
,
Chen Cui
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2096
3,106
Downloads
5,044
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.6 No.10
,October 25, 2013
DOI:
10.4236/ijcns.2013.610046
4,828
Downloads
7,757
Views
Citations
Taxonomy for Privacy Policies of Social Networks Sites
(Articles)
Sergio Donizetti Zorzo
,
Rodrigo Pereira Botelho
,
Paulo Muniz de Ávila
Social Networking
Vol.2 No.4
,October 30, 2013
DOI:
10.4236/sn.2013.24015
5,452
Downloads
10,069
Views
Citations
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review
(Articles)
Osama Harfoushi
,
Bader Alfawwaz
,
Nazeeh A. Ghatasheh
,
Ruba Obiedat
,
Mua’ad M. Abu-Faraj
,
Hossam Faris
Communications and Network
Vol.6 No.1
,February 13, 2014
DOI:
10.4236/cn.2014.61003
14,843
Downloads
29,788
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,777
Downloads
6,600
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top