Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Experimental Study on Measurement Methods of Bulk Density and Porosity of Rock Samples
(Articles)
Weiren Lin
,
Osamu Tadai
,
Manabu Takahashi
,
Daisaku Sato
,
Takehiro Hirose
,
Wataru Tanikawa
,
Yohei Hamada
,
Kentaro Hatakeda
Journal of Geoscience and Environment Protection
Vol.3 No.5
, July 17, 2015
DOI:
10.4236/gep.2015.35009
6,425
Downloads
10,116
Views
Citations
The Differentiation of Phonological and Morphological Intrusion for the Two-Dimensional Orthography
(Articles)
Yang Lee
,
Claudia Carello
Psychology
Vol.7 No.9
, August 9, 2016
DOI:
10.4236/psych.2016.79123
2,198
Downloads
4,190
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
, April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,149
Downloads
5,266
Views
Citations
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents
(Articles)
Thomas Djotio Ndié
,
Claude Tangha
,
Guy Bertrand Fopak
Journal of Information Security
Vol.3 No.4
, October 31, 2012
DOI:
10.4236/jis.2012.34035
4,724
Downloads
7,699
Views
Citations
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
, December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,916
Downloads
5,775
Views
Citations
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
(Articles)
Agbotiname L. Imoize
,
Taiwo Oyedare
,
Michael E. Otuokere
,
Sachin Shetty
Communications and Network
Vol.10 No.4
, November 23, 2018
DOI:
10.4236/cn.2018.104017
2,148
Downloads
4,710
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
International Journal of Communications, Network and System Sciences
Vol.2 No.6
, September 22, 2009
DOI:
10.4236/ijcns.2009.26063
6,020
Downloads
10,830
Views
Citations
Measuring Salinity within Shallow Piezometers:Comparison of Two Field Methods
(Articles)
Enrico Balugani
,
Marco Antonellini
Journal of Water Resource and Protection
Vol.2 No.3
, April 6, 2010
DOI:
10.4236/jwarp.2010.23029
7,606
Downloads
12,470
Views
Citations
Ground Water Vis-A-Vis Sea Water Intrusion Analysis for a Part of Limestone Tract of Gujarat Coast, India
(Articles)
Abhay K. Soni
,
Paras R. Pujari
Journal of Water Resource and Protection
Vol.2 No.5
, May 27, 2010
DOI:
10.4236/jwarp.2010.25053
7,507
Downloads
14,694
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
International Journal of Communications, Network and System Sciences
Vol.3 No.5
, May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,601
Downloads
8,671
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
International Journal of Communications, Network and System Sciences
Vol.4 No.5
, May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,585
Downloads
8,769
Views
Citations
Metallurgical Use of Heat Altered Coal: A Case Study
(Articles)
Debjani Nag
,
A.K. Singh
,
P.K. Banerjee
Journal of Minerals and Materials Characterization and Engineering
Vol.8 No.7
, July 20, 2009
DOI:
10.4236/jmmce.2009.87047
7,047
Downloads
9,913
Views
Citations
Fluid Mechanics of Intrusives
(Articles)
Jónas Elíasson
International Journal of Geosciences
Vol.4 No.10A
, December 30, 2013
DOI:
10.4236/ijg.2013.410A002
2,876
Downloads
5,087
Views
Citations
This article belongs to the Special Issue on
Advances in Mathematical and Computational Geosciences
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
, March 12, 2014
DOI:
10.4236/jis.2014.52004
4,899
Downloads
6,922
Views
Citations
Petrology, Geochemistry and Tectonomagmatic Setting of Neshveh Intrusion (NW Saveh)
(Articles)
Reza Keshavarzi
,
Dariush Esmaili
,
Mehdi Rezaei Kahkhaei
,
Mir Ali Asghar Mokhtari
,
Reza Jabari
Open Journal of Geology
Vol.4 No.5
, May 2, 2014
DOI:
10.4236/ojg.2014.45013
6,308
Downloads
9,878
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
, September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,754
Downloads
5,869
Views
Citations
Assessment of Saltwater Intrusion and Discharges to a Wetland with a 3D Transient Variable Density Flow Model: The Coastal Plane Oropesa-Torreblanca Aquifer, Spain
(Articles)
Ignacio Sanz-Garrido
,
José E. Capilla
Journal of Water Resource and Protection
Vol.7 No.9
, July 14, 2015
DOI:
10.4236/jwarp.2015.79062
4,128
Downloads
5,640
Views
Citations
Numerical Simulation and Prediction of Groundwater Flow in a Coastal Aquifer of Southern India
(Articles)
S. Sathish
,
L. Elango
Journal of Water Resource and Protection
Vol.7 No.17
, December 25, 2015
DOI:
10.4236/jwarp.2015.717122
5,362
Downloads
7,203
Views
Citations
Assessing the Seawater Intrusion Due to Beach Wells in the Desalination Plant
(Articles)
Yunes Mogheir
Journal of Geoscience and Environment Protection
Vol.4 No.12
, December 8, 2016
DOI:
10.4236/gep.2016.412003
1,929
Downloads
3,249
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
, January 28, 2019
DOI:
10.4236/cn.2019.111002
997
Downloads
2,203
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top