Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks
(Articles)
Arif Sari
,
Mehmet Karay
Int'l J. of Communications, Network and System Sciences
Vol.8 No.13
,December 30, 2015
DOI:
10.4236/ijcns.2015.813051
3,933
Downloads
4,987
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,431
Downloads
11,157
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,043
Downloads
6,849
Views
Citations
Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter
(Articles)
Juuso T. Olkkonen
,
Hannu Olkkonen
Wireless Sensor Network
Vol.2 No.6
,June 24, 2010
DOI:
10.4236/wsn.2010.26057
4,576
Downloads
8,480
Views
Citations
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks
(Articles)
Mi Wen
,
Zhi Yin
,
Yu Long
,
Yong Wang
Wireless Sensor Network
Vol.2 No.9
,September 30, 2010
DOI:
10.4236/wsn.2010.29083
5,420
Downloads
10,333
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,672
Downloads
15,947
Views
Citations
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks
(Articles)
Hari Krishna Vellalacheruvu
,
Sanjeev Kumar
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23013
5,780
Downloads
11,314
Views
Citations
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34026
5,933
Downloads
8,991
Views
Citations
Optimization of Security Communication Wired Network by Means of Genetic Algorithms
(Articles)
Fabio Garzia
,
Natale Tirocchi
,
Michele Scarpiniti
,
Roberto Cusani
Communications and Network
Vol.4 No.3
,August 31, 2012
DOI:
10.4236/cn.2012.43024
4,102
Downloads
7,271
Views
Citations
A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks
(Articles)
Hyeon Myeong Choi
,
Su Man Nam
,
Tae Ho Cho
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53005
5,123
Downloads
9,774
Views
Citations
Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security
(Articles)
Kuljeet Kaur
,
Geetha Ganesan
Journal of Information Security
Vol.4 No.4
,September 5, 2013
DOI:
10.4236/jis.2013.44022
4,029
Downloads
6,379
Views
Citations
Scalable Trust-Based Secure WSNs
(Articles)
Amar Agrawal
,
Ruizhong Wei
Journal of Computer and Communications
Vol.2 No.7
,May 21, 2014
DOI:
10.4236/jcc.2014.27003
3,648
Downloads
4,794
Views
Citations
Proxy Server Experiment and Network Security with Changing Nature of the Web
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.7 No.12
,December 4, 2014
DOI:
10.4236/ijcns.2014.712052
4,033
Downloads
5,879
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,586
Downloads
7,638
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,962
Downloads
4,804
Views
Citations
Discussion and Research on Information Security Attack and Defense Platform Construction in Universities Based on Cloud Computing and Virtualization
(Articles)
Xiancheng Ding
Journal of Information Security
Vol.7 No.5
,October 27, 2016
DOI:
10.4236/jis.2016.75025
2,325
Downloads
3,635
Views
Citations
Extension of Kerberos with X.509 and Integration of Elliptic Curve Cryptography in Authentication
(Articles)
Murat Akkaya
Int'l J. of Communications, Network and System Sciences
Vol.9 No.12
,December 30, 2016
DOI:
10.4236/ijcns.2016.912046
1,848
Downloads
3,557
Views
Citations
Proposal of a Methodology for the Assessment of Security Levels of IoT Wireless Sensor Networks in Nuclear Environments
(Articles)
Marcia Maria Savoine
,
Mario Olimpio de Menezes
,
Delvonei Alves de Andrade
World Journal of Nuclear Science and Technology
Vol.8 No.2
,April 11, 2018
DOI:
10.4236/wjnst.2018.82008
1,221
Downloads
3,266
Views
Citations
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
(Articles)
Minsu Park
,
Mwawi Kayuni
,
Tiwonge Manda
,
Hyunsung Kim
Journal of Computer and Communications
Vol.8 No.1
,January 10, 2020
DOI:
10.4236/jcc.2020.81004
632
Downloads
1,602
Views
Citations
Safety Protection Design of Virtual Machine Drift Flow in Cloud Data Center Based on VXLAN Technology
(Articles)
Heping Pu
,
Yijun Wang
,
Xinke An
Journal of Computer and Communications
Vol.8 No.8
,August 28, 2020
DOI:
10.4236/jcc.2020.88005
464
Downloads
1,410
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top