Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,584
Downloads
14,494
Views
Citations
Optimal Extraction of Groundwater in Gaza Coastal Aquifer
(Articles)
Khalid QAHMAN
,
Abdelkader LARABI
,
Driss OUAZAR
,
Ahmed NAJI
,
Alexander H.-D. CHENG
Journal of Water Resource and Protection
Vol.1 No.4
,October 16, 2009
DOI:
10.4236/jwarp.2009.14030
7,305
Downloads
12,876
Views
Citations
Hydro-Geochemical Characteristics of Groundwater Beneath the Gaza Strip
(Articles)
Muhammad Al-Khatib
,
Husam Al-Najar
Journal of Water Resource and Protection
Vol.3 No.5
,May 19, 2011
DOI:
10.4236/jwarp.2011.35043
7,991
Downloads
13,506
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,221
Downloads
11,271
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,840
Downloads
8,950
Views
Citations
The Role of Fluids in Promoting Seismic Activity in Active Spreading Centers of the Salton Trough, California, USA
(Articles)
Musa Hussein
,
Aaron A. Velasco
,
Laura Serpa
,
Diane Doser
International Journal of Geosciences
Vol.3 No.2
,May 23, 2012
DOI:
10.4236/ijg.2012.32032
4,055
Downloads
6,490
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,888
Downloads
9,061
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,569
Downloads
8,246
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,757
Downloads
10,911
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
8,770
Downloads
14,005
Views
Citations
Mineral Chemistry and Magmatic Differentiation Evidences in the Neshveh Intrusion (NW Saveh, Central Iran)
(Articles)
Reza Keshavarzi
,
Dariush Esmaili
,
Mehdi Rezaei Kahkhaei
,
Mir Ali Asghar Mokhtari
,
Mehdi Kordlou
Open Journal of Geology
Vol.4 No.6
,June 23, 2014
DOI:
10.4236/ojg.2014.46020
5,636
Downloads
7,251
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,480
Downloads
5,390
Views
Citations
Investigation of the Behavior of a Jet Issued into Two-Layer Density-Stratified Fluid
(Articles)
Shogo Shakouchi
,
Shota Fukue
,
Tomomi Uchiyama
Journal of Flow Control, Measurement & Visualization
Vol.3 No.1
,December 15, 2014
DOI:
10.4236/jfcmv.2015.31001
3,938
Downloads
4,663
Views
Citations
Saltwater Intrusion in Jizan Coastal Zone, Southwest Saudi Arabia, Inferred from Geoelectric Resistivity Survey
(Articles)
Saad Mogren
International Journal of Geosciences
Vol.6 No.3
,March 26, 2015
DOI:
10.4236/ijg.2015.63022
5,393
Downloads
6,831
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,611
Downloads
7,215
Views
Citations
Salinity Intrusion in Interior Coast of Bangladesh: Challenges to Agriculture in South-Central Coastal Zone
(Articles)
Mohammed Abdul Baten
,
Lubna Seal
,
Kazi Sunzida Lisa
American Journal of Climate Change
Vol.4 No.3
,June 11, 2015
DOI:
10.4236/ajcc.2015.43020
9,981
Downloads
14,862
Views
Citations
Simulation of Regional Karst Aquifer System and Assessment of Groundwater Resources in Manatí-Vega Baja, Puerto Rico
(Articles)
Balati Maihemuti
,
Reza Ghasemizadeh
,
Xue Yu
,
Ingrid Padilla
,
Akram N. Alshawabkeh
Journal of Water Resource and Protection
Vol.7 No.12
,August 20, 2015
DOI:
10.4236/jwarp.2015.712075
3,334
Downloads
4,303
Views
Citations
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
,November 12, 2015
DOI:
10.4236/iim.2015.76023
5,235
Downloads
6,123
Views
Citations
This article belongs to the Special Issue on
Cyber Security
Geochemical Study of Almoqlaq Intrusive Body in North of Asadabad in Hamedan Province, Iran
(Articles)
Ahmad Farnin
Open Journal of Geology
Vol.6 No.1
,January 28, 2016
DOI:
10.4236/ojg.2016.61006
5,357
Downloads
6,533
Views
Citations
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,446
Downloads
2,632
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top