Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analytical Engineering for Data Stream
(Articles)
Rogério Rossi
,
Kechi Hirama
Journal of Computer and Communications
Vol.10 No.7
,July 18, 2022
DOI:
10.4236/jcc.2022.107002
133
Downloads
631
Views
Citations
Automatic Anomaly Detection of Respiratory Motion Based on Singular Spectrum Analysis
(Articles)
Jun’ichi Kotoku
,
Shinobu Kumagai
,
Ryouhei Uemura
,
Susumu Nakabayashi
,
Takenori Kobayashi
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.5 No.1
,February 29, 2016
DOI:
10.4236/ijmpcero.2016.51009
2,515
Downloads
3,443
Views
Citations
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
(Articles)
Alese Boniface Kayode
,
Alowolodu Olufunso Dayo
,
Adekunle Adewale Uthman
Communications and Network
Vol.13 No.2
,May 27, 2021
DOI:
10.4236/cn.2021.132006
300
Downloads
1,001
Views
Citations
Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection
(Articles)
Khalid K. Almuzaini
,
Aaron Gulliver
Wireless Sensor Network
Vol.2 No.11
,November 19, 2010
DOI:
10.4236/wsn.2010.211097
8,273
Downloads
15,860
Views
Citations
Security Analysis of Subspace Network Coding
(Articles)
Yantao Liu
,
Yasser Morgan
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91007
980
Downloads
2,130
Views
Citations
Findings Seminal Papers Using Data Mining Techniques
(Articles)
Alexander Báez Hernández
,
Debrayan Bravo Hidalgo
Open Journal of Social Sciences
Vol.8 No.9
,September 25, 2020
DOI:
10.4236/jss.2020.89023
485
Downloads
1,689
Views
Citations
FPGA-Based Stream Processing for Frequent Itemset Mining with Incremental Multiple Hashes
(Articles)
Kasho Yamamoto
,
Masayuki Ikebe
,
Tetsuya Asai
,
Masato Motomura
Circuits and Systems
Vol.7 No.10
,August 25, 2016
DOI:
10.4236/cs.2016.710281
1,735
Downloads
2,657
Views
Citations
Classification and Novel Class Detection in Data Streams Using Strings
(Articles)
Rimjhim Singh
,
Manoj B. Chandak
Open Access Library Journal
Vol.2 No.5
,May 28, 2015
DOI:
10.4236/oalib.1101507
972
Downloads
1,720
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
721
Downloads
5,700
Views
Citations
A Novel Spatial Clustering Algorithm Based on Delaunay Triangulation
(Articles)
Xiankun Yang
,
Weihong Cui
Journal of Software Engineering and Applications
Vol.3 No.2
,March 2, 2010
DOI:
10.4236/jsea.2010.32018
8,286
Downloads
14,727
Views
Citations
Model of Combined Transport of Perishable Foodstuffs and Safety Inspection Based on Data Mining
(Articles)
Tongjuan Liu
,
Anqi Hu
Food and Nutrition Sciences
Vol.8 No.7
,July 27, 2017
DOI:
10.4236/fns.2017.87054
963
Downloads
1,718
Views
Citations
Spatio-Temporal Land Cover Dynamics in Open Cast Coal Mine Area of Singrauli, M.P., India
(Articles)
Imran Khan
,
Akram Javed
Journal of Geographic Information System
Vol.4 No.6
,December 31, 2012
DOI:
10.4236/jgis.2012.46057
7,136
Downloads
10,586
Views
Citations
Research on Track Fastener Service Status Detection Based on Improved Yolov4 Model
(Articles)
Jing He
,
Weiqi Wang
,
Nengpu Yang
Journal of Transportation Technologies
Vol.14 No.2
,April 15, 2024
DOI:
10.4236/jtts.2024.142013
30
Downloads
111
Views
Citations
Cyber Resilience through Real-Time Threat Analysis in Information Security
(Articles)
Aparna Gadhi
,
Ragha Madhavi Gondu
,
Hitendra Chaudhary
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.17 No.4
,April 30, 2024
DOI:
10.4236/ijcns.2024.174004
38
Downloads
107
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,584
Downloads
14,492
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,840
Downloads
8,949
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,885
Downloads
9,053
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,567
Downloads
8,243
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
8,767
Downloads
13,998
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,479
Downloads
5,385
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top