Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
False Positive Responses Optimization for Intrusion Detection System
(Articles)
Jalal Baayer
,
Boubker Regragui
,
Aziz Baayer
Journal of Information Security
Vol.5 No.2
,February 20, 2014
DOI:
10.4236/jis.2014.52003
5,388
Downloads
8,902
Views
Citations
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54015
6,004
Downloads
7,868
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,835
Downloads
2,737
Views
Citations
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
(Articles)
Rathinam Gopal
,
Velusamy Parthasarathy
Circuits and Systems
Vol.7 No.11
,September 7, 2016
DOI:
10.4236/cs.2016.711298
1,323
Downloads
2,604
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
691
Downloads
3,272
Views
Citations
An Enhanced and Explainable Hybrid Ensemble Intrusion Detection System for Connected Vehicles
(Articles)
Xuemei Li
,
Rui Zhu
,
Huirong Fu
Journal of Information Security
Vol.16 No.3
,July 7, 2025
DOI:
10.4236/jis.2025.163020
30
Downloads
176
Views
Citations
Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks
(Articles)
Yang Gyun Kim
,
Benito Mendoza
,
Ohbong Kwon
,
John Yoon
Journal of Computer and Communications
Vol.10 No.10
,October 27, 2022
DOI:
10.4236/jcc.2022.1010005
204
Downloads
1,089
Views
Citations
Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
(Articles)
Rabeb Zarai
,
Mnaouer Kachout
,
Mohamed A. G. Hazber
,
Mohammed A. Mahdi
Open Access Library Journal
Vol.7 No.3
,March 25, 2020
DOI:
10.4236/oalib.1106151
1,187
Downloads
3,756
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,472
Downloads
8,370
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,364
Downloads
8,379
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,790
Downloads
6,651
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
,September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,598
Downloads
5,484
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
,January 28, 2019
DOI:
10.4236/cn.2019.111002
905
Downloads
1,902
Views
Citations
The Detection of Inter-Turn Short Circuits in the Stator Windings of Sensorless Operating Induction Motors
(Articles)
Jean Blaise Teguia
,
Godpromesse Kenne
,
Alain Tewa Soup Kammogne
,
Georges Collince Fouokeng
,
Arnaud Nanfak
World Journal of Engineering and Technology
Vol.9 No.3
,August 25, 2021
DOI:
10.4236/wjet.2021.93046
319
Downloads
2,022
Views
Citations
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
,November 1, 2023
DOI:
10.4236/jdaip.2023.114019
177
Downloads
832
Views
Citations
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
295
Downloads
2,210
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,740
Downloads
14,881
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,980
Downloads
9,269
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,993
Downloads
9,420
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,669
Downloads
8,586
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top