Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
International Journal of Communications, Network and System Sciences
Vol.6 No.1
, January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,783
Downloads
8,961
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
, January 30, 2013
DOI:
10.4236/jis.2013.41007
7,004
Downloads
11,616
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
, February 14, 2014
DOI:
10.4236/jilsa.2014.61005
9,858
Downloads
16,601
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
, November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,658
Downloads
6,051
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
, April 16, 2015
DOI:
10.4236/jcc.2015.34006
6,037
Downloads
8,523
Views
Citations
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
, November 12, 2015
DOI:
10.4236/iim.2015.76023
5,440
Downloads
6,803
Views
Citations
This article belongs to the Special Issue on
Cyber Security
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
, June 8, 2016
DOI:
10.4236/cs.2016.78115
1,639
Downloads
2,771
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
, November 22, 2024
DOI:
10.4236/ijids.2024.62002
165
Downloads
1,086
Views
Citations
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations
(Articles)
Jackson Norris
,
Vijay K. Madisetti
Journal of Information Security
Vol.16 No.2
, April 8, 2025
DOI:
10.4236/jis.2025.162014
122
Downloads
923
Views
Citations
Use of Machine Learning and Deep Learning in Intrusion Detection for IoT
(Articles)
Muhannad Almohaimeed
,
Rasha Alyoubi
,
Afnan Aljohani
,
Mashael Alhaidari
,
Faisal Albalwy
,
Fahad Ghabban
,
Ibrahim Alfadli
,
Omair Ameerbakhsh
Advances in Internet of Things
Vol.15 No.2
, April 1, 2025
DOI:
10.4236/ait.2025.152002
318
Downloads
1,953
Views
Citations
Improving the Performance of a Data-Driven Intelligent Model for Intrusion Detection in IoT Networks
(Articles)
Severin Nguendap
,
Hamdane Allamine Moussa
,
Eric Fotsing
,
Armand Nzeukou
,
Jean Pierre Lienou
Journal of Computer and Communications
Vol.13 No.9
, September 26, 2025
DOI:
10.4236/jcc.2025.139005
45
Downloads
341
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
, October 24, 2011
DOI:
10.4236/jis.2011.24019
5,365
Downloads
10,434
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
, April 14, 2016
DOI:
10.4236/jis.2016.73013
3,693
Downloads
5,827
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
, December 4, 2018
DOI:
10.4236/jis.2019.101001
1,829
Downloads
4,476
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
, February 29, 2024
DOI:
10.4236/jis.2024.152008
676
Downloads
3,399
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A WebGIS Solution for Estimation Landuse Affected by Salinity Intrusion: Case Study in Ben Tre Province, Vietnam
(Articles)
Tran Thai Binh
,
Ho Lam Truong
,
Do Thanh Long
Journal of Geographic Information System
Vol.12 No.3
, June 18, 2020
DOI:
10.4236/jgis.2020.123012
706
Downloads
2,610
Views
Citations
Fault Tolerance Limits and Input Stimulus Selection Using an Implemented FPGA-Based Testing System
(Articles)
Papakostas K. Dimitrios
,
Pouros P. Sotirios
,
Vassios D. Vassilios
Journal of Computer and Communications
Vol.2 No.13
, November 19, 2014
DOI:
10.4236/jcc.2014.213003
2,943
Downloads
3,854
Views
Citations
An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review
(Articles)
Dominic John Kavoi
,
Charles Jumaa Katila
,
Richard Otieno Omollo
Journal of Information Security
Vol.16 No.3
, July 23, 2025
DOI:
10.4236/jis.2025.163021
145
Downloads
763
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
, December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,554
Downloads
10,044
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
International Journal of Communications, Network and System Sciences
Vol.5 No.9A
, September 18, 2012
DOI:
10.4236/ijcns.2012.529069
5,145
Downloads
9,220
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
First
<
...
2
3
4
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top