Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
, July 29, 2011
DOI:
10.4236/jis.2011.23012
7,804
Downloads
13,894
Views
Citations
IoT Security System Based on Software Defined Network with Manufacturer Usage Description
(Articles)
Takuma Sakamoto
,
Kenya Sato
Communications and Network
Vol.18 No.1
, December 10, 2025
DOI:
10.4236/cn.2026.181001
43
Downloads
271
Views
Citations
Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks
(Articles)
Hangxia Zhou
,
Qian Liu
,
Chen Cui
Communications and Network
Vol.5 No.3C
, October 7, 2013
DOI:
10.4236/cn.2013.53B2096
3,230
Downloads
5,335
Views
Citations
Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN
(Articles)
Shaik Sahil Babu
,
Arnab Raha
,
Mrinal Kanti Naskar
Wireless Sensor Network
Vol.6 No.8
, August 22, 2014
DOI:
10.4236/wsn.2014.68016
5,643
Downloads
7,276
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
, March 28, 2018
DOI:
10.4236/jcc.2018.63010
974
Downloads
5,963
Views
Citations
The Analysis of the Structure and Security of Home Control Subnet
(Articles)
Chengyi WANG
,
Yun ZHANG
Wireless Sensor Network
Vol.1 No.1
, April 10, 2009
DOI:
10.4236/wsn.2009.11009
6,358
Downloads
11,381
Views
Citations
Considerations and Open Issues in Delay Tolerant Network’S (DTNs) Security
(Articles)
Harminder Singh Bindra
,
Amrit Lal Sangal
Wireless Sensor Network
Vol.2 No.8
, August 3, 2010
DOI:
10.4236/wsn.2010.28076
7,925
Downloads
15,351
Views
Citations
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus
(Articles)
Subana Thanasegaran
,
Yi Yin
,
Yuichiro Tateiwa
,
Yoshiaki Katayama
,
Naohisa Takahashi
International Journal of Communications, Network and System Sciences
Vol.4 No.11
, October 31, 2011
DOI:
10.4236/ijcns.2011.411084
5,016
Downloads
8,981
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
International Journal of Communications, Network and System Sciences
Vol.6 No.10
, October 25, 2013
DOI:
10.4236/ijcns.2013.610046
4,975
Downloads
8,097
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
, March 12, 2014
DOI:
10.4236/jis.2014.52004
4,888
Downloads
6,881
Views
Citations
Encrypted CDMA Audio Network
(Articles)
Alfredo A. Ortega
,
Víctor A. Bettachini
,
Pablo I. Fierens
,
José Ignacio Alvarez-Hamelin
Journal of Information Security
Vol.5 No.3
, June 25, 2014
DOI:
10.4236/jis.2014.53008
3,318
Downloads
5,115
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
International Journal of Communications, Network and System Sciences
Vol.14 No.4
, April 30, 2021
DOI:
10.4236/ijcns.2021.144004
1,357
Downloads
3,105
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
, May 26, 2023
DOI:
10.4236/jcc.2023.115009
323
Downloads
1,387
Views
Citations
Network Construction Food Security of Local Fishing Community in Thailand
(Articles)
Supanut Subnawin
,
Anurak Singchai
Open Journal of Social Sciences
Vol.12 No.2
, February 28, 2024
DOI:
10.4236/jss.2024.122026
197
Downloads
648
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21002
6,977
Downloads
12,838
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21004
7,565
Downloads
16,411
Views
Citations
Research and Analysis on Cognitive Radio Network Security
(Articles)
Long Tang
,
Juebo Wu
Wireless Sensor Network
Vol.4 No.4
, April 24, 2012
DOI:
10.4236/wsn.2012.44017
9,166
Downloads
16,707
Views
Citations
Research on Application of Mobile Agent Based on Immune Algorithms in Ad Hoc Network
(Articles)
Qinggong Ma
,
Bo Yang
Journal of Computer and Communications
Vol.3 No.10
, October 29, 2015
DOI:
10.4236/jcc.2015.310004
2,128
Downloads
2,961
Views
Citations
A Secure and Energy-Balanced Routing Scheme for Mobile Wireless Sensor Network
(Articles)
Bei Liu
,
Yuanming Wu
Wireless Sensor Network
Vol.7 No.11
, November 11, 2015
DOI:
10.4236/wsn.2015.711012
8,090
Downloads
10,818
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
, January 23, 2018
DOI:
10.4236/jis.2018.91007
1,168
Downloads
2,667
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top