Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
Journal of Information Security
Vol.5 No.4
, September 25, 2014
DOI:
10.4236/jis.2014.54015
6,113
Downloads
8,262
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
, August 24, 2016
DOI:
10.4236/cs.2016.710275
1,916
Downloads
3,034
Views
Citations
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
(Articles)
Rathinam Gopal
,
Velusamy Parthasarathy
Circuits and Systems
Vol.7 No.11
, September 7, 2016
DOI:
10.4236/cs.2016.711298
1,408
Downloads
2,968
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
, September 30, 2021
DOI:
10.4236/jis.2021.124014
916
Downloads
4,079
Views
Citations
Methodological Framework for Developing an Adaptive Intrusion Detection System (IDS) Incorporating Sustainability Factors
(Articles)
Yaya Gadjama Soureya
,
Justin Moskolai Ngossaha
,
Eric Michel Deussom Djomadji
,
Ngoumou Amougou
,
Samuel Bowong Tsakou
,
Marcel Fouda Ndjodo
Journal of Computer and Communications
Vol.13 No.7
, July 23, 2025
DOI:
10.4236/jcc.2025.137009
96
Downloads
470
Views
Citations
An Enhanced and Explainable Hybrid Ensemble Intrusion Detection System for Connected Vehicles
(Articles)
Xuemei Li
,
Rui Zhu
,
Huirong Fu
Journal of Information Security
Vol.16 No.3
, July 7, 2025
DOI:
10.4236/jis.2025.163020
95
Downloads
598
Views
Citations
Intrusion Detection for Edge-IoT Using LSTM-Autoencoder
(Articles)
Bodjré Aka Hugues Félix
,
Kié Eba Victoire
,
N’guessan N’takpé Christian Placide
,
Brou Pacôme
,
Asseu Olivier Pascal
Open Journal of Applied Sciences
Vol.15 No.9
, September 15, 2025
DOI:
10.4236/ojapps.2025.159177
98
Downloads
856
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
, October 27, 2022
DOI:
10.4236/jcc.2022.1010005
318
Downloads
1,418
Views
Citations
Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
(Articles)
Rabeb Zarai
,
Mnaouer Kachout
,
Mohamed A. G. Hazber
,
Mohammed A. Mahdi
Open Access Library Journal
Vol.7 No.3
, March 25, 2020
DOI:
10.4236/oalib.1106151
1,288
Downloads
4,266
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
International Journal of Communications, Network and System Sciences
Vol.3 No.5
, May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,620
Downloads
8,724
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
International Journal of Communications, Network and System Sciences
Vol.4 No.5
, May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,604
Downloads
8,816
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
, March 12, 2014
DOI:
10.4236/jis.2014.52004
4,915
Downloads
6,964
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
, September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,773
Downloads
5,923
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
, January 28, 2019
DOI:
10.4236/cn.2019.111002
1,016
Downloads
2,247
Views
Citations
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
, November 1, 2023
DOI:
10.4236/jdaip.2023.114019
260
Downloads
1,154
Views
Citations
5G Network Vulnerabilities: A Security Mechanism for Detecting and Blocking DDoS Threats at the Network Edge
(Articles)
Sakib Mahmud
,
Ahsan Ullah
,
Shakhawat Hossain Shipon
,
Mahedi Hassan
,
Md Nazmus Sakib
Journal of Information Security
Vol.16 No.4
, August 26, 2025
DOI:
10.4236/jis.2025.164024
118
Downloads
772
Views
Citations
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
, April 19, 2022
DOI:
10.4236/jsea.2022.154006
392
Downloads
2,718
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
International Journal of Communications, Network and System Sciences
Vol.1 No.4
, October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,922
Downloads
15,279
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
International Journal of Communications, Network and System Sciences
Vol.5 No.2
, February 28, 2012
DOI:
10.4236/ijcns.2012.52010
5,097
Downloads
9,597
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
, July 25, 2012
DOI:
10.4236/jis.2012.33030
5,110
Downloads
9,806
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top