Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Orthodontic Intrusion of over Erupted Permanent Maxillary Molars Using Temporary Anchorage Devices
(Articles)
Mohammad Jaradat
,
Waddah Arda
Open Journal of Stomatology
Vol.9 No.5
,May 13, 2019
DOI:
10.4236/ojst.2019.95010
1,475
Downloads
3,997
Views
Citations
Baddeleyite from Large Complex Deposits: Significance for Archean-Paleozoic Plume Processes in the Arctic Region (NE Fennoscandian Shield) Based on U-Pb (ID-TIMS) and LA-ICP-MS Data
(Articles)
Tamara Bayanova
,
Viktor Subbotin
,
Svetlana Drogobuzhskaya
,
Anatoliy Nikolaev
,
Ekaterina Steshenko
Open Journal of Geology
Vol.9 No.8
,August 30, 2019
DOI:
10.4236/ojg.2019.98031
607
Downloads
1,278
Views
Citations
Petrography and Mineralogy of the Quartz and Quartz-Feldspar Sulphide Veins in the Pan-African Syenitic Massif of Guider (North Cameroon)
(Articles)
Marguerite Boyabe
,
Daouda Dawai
,
Rigobert Tchameni
,
Periclex Martial Fosso Tchunte
Open Journal of Geology
Vol.10 No.3
,March 20, 2020
DOI:
10.4236/ojg.2020.103013
676
Downloads
2,804
Views
Citations
Pore Structure Characteristics of Taiyuan Formation Shale in Qinshui Basin
(Articles)
Hongyue Duan
,
Wenkai Zhang
,
Xinquan Wang
,
Kaizi Jiang
,
Tingting Huang
Journal of Geoscience and Environment Protection
Vol.8 No.7
,July 27, 2020
DOI:
10.4236/gep.2020.87007
330
Downloads
737
Views
Citations
Hydrogeology of Eastern Niger Delta: A Review
(Articles)
T. K. S. Abam
,
H. O. Nwankwoala
Journal of Water Resource and Protection
Vol.12 No.9
,September 21, 2020
DOI:
10.4236/jwarp.2020.129045
777
Downloads
3,462
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
522
Downloads
2,552
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
717
Downloads
10,657
Views
Citations
Modeling of the Saltwater Intrusion Using the Level Set Method. Application to Henry’s Problem
(Articles)
Joachna Meya Loua-Bouayi
,
Christian Tathy
,
Adolphe Kimbonguila Manounou
Computational Water, Energy, and Environmental Engineering
Vol.11 No.1
,January 6, 2022
DOI:
10.4236/cweee.2022.111002
200
Downloads
804
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
248
Downloads
1,204
Views
Citations
An Activity Recognition System at Home Based on CO
2
Sensors
(Articles)
Hiroyuki Matsubara
Journal of Computer and Communications
Vol.11 No.11
,November 24, 2023
DOI:
10.4236/jcc.2023.1111004
75
Downloads
210
Views
Citations
An Assessment of Saltwater Intrusion in Coastal Regions of Lagos, Nigeria
(Articles)
Obunadike Callistus
,
Akerele D. Daniel
,
Abiodun O. Pelumi
,
Olisah Somtobe
,
Oloyede Kunle
,
Obunadike S. Echezona
,
Obunadike J. Chinenye
Journal of Geoscience and Environment Protection
Vol.12 No.1
,January 25, 2024
DOI:
10.4236/gep.2024.121007
62
Downloads
349
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
826
Downloads
5,193
Views
Citations
New U-Pb and Sm-Nd Data and REE Distribution in Sulphides of Paleoproterozoic PGE Layered Intrusions in the Arctic Part of the Fennoscandian Shield
(Articles)
Tamara Bayanova
,
Irina Elizarova
,
Pavel Serov
,
Nadezhda Ekimova
,
Evgeny Kunakkuzin
,
Ekaterina Steshenko
,
Yury Neradovsky
,
Markku Iljina
,
Dmitry Zhirov
Open Journal of Geology
Vol.9 No.11
,October 10, 2019
DOI:
10.4236/ojg.2019.911089
424
Downloads
1,040
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
134
Downloads
669
Views
Citations
Human cancer is transmitted via genome
(Articles)
Sergey N. Rumyantsev
Open Journal of Genetics
Vol.3 No.1
,March 26, 2013
DOI:
10.4236/ojgen.2013.31002
4,913
Downloads
8,132
Views
Citations
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,055
Downloads
6,681
Views
Citations
Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
(Articles)
Rabeb Zarai
,
Mnaouer Kachout
,
Mohamed A. G. Hazber
,
Mohammed A. Mahdi
Open Access Library Journal
Vol.7 No.3
,March 25, 2020
DOI:
10.4236/oalib.1106151
998
Downloads
3,070
Views
Citations
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
,November 1, 2023
DOI:
10.4236/jdaip.2023.114019
86
Downloads
471
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
134
Downloads
541
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Cyberspace Security Using Adversarial Learning and Conformal Prediction
(Articles)
Harry Wechsler
Intelligent Information Management
Vol.7 No.4
,July 10, 2015
DOI:
10.4236/iim.2015.74016
6,946
Downloads
8,272
Views
Citations
<
...
4
5
6
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top