Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,454
Downloads
10,601
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,357
Downloads
8,478
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,777
Downloads
8,395
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,639
Downloads
9,334
Views
Citations
The Theory and Application of Upwind Finite Difference Fractional Steps Procedure for Seawater Intrusion
(Articles)
Yirang Yuan
,
Hongxing Rui
,
Dong Liang
,
Changfeng Li
International Journal of Geosciences
Vol.3 No.5A
,October 31, 2012
DOI:
10.4236/ijg.2012.325098
3,885
Downloads
6,378
Views
Citations
This article belongs to the Special Issue on
Advances in Mathematical and Computational Geosciences
Contributions of Chemical and Isotopic Tools for Understanding the Groundwater Modes Recharge and Flow in the Lower Cretaceous Aquifer in the Moroccan Sahara
(Articles)
Nabila Edoulati
,
Said Boutaleb
,
Ismail Bettar
,
Ali Ouchbani
Journal of Water Resource and Protection
Vol.5 No.2
,February 19, 2013
DOI:
10.4236/jwarp.2013.52020
4,683
Downloads
8,416
Views
Citations
Effects of Short Time Variation in the River Discharge on the Salt Wedge Intrusion in the Yura Estuary, a Micro Tidal Estuary, Japan
(Articles)
Tatsuhiro Funahashi
,
Akihide Kasai
,
Masahiro Ueno
,
Yoh Yamashita
Journal of Water Resource and Protection
Vol.5 No.3A
,March 28, 2013
DOI:
10.4236/jwarp.2013.53A035
4,685
Downloads
7,416
Views
Citations
This article belongs to the Special Issue on
Impacts of Freshwater Alterations on Estuarine and Coastal Systems
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology
(Articles)
Emad Felemban
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65028
12,527
Downloads
21,518
Views
Citations
Use of Finite Element Analysis for the Prediction of Driver Fatality Ratio Based on Vehicle Intrusion Ratio in Head-On Collisions
(Articles)
Rasoul Moradi
,
Rajarshi Setpally
,
Hamid M. Lankarani
Applied Mathematics
Vol.4 No.5A
,May 27, 2013
DOI:
10.4236/am.2013.45A007
5,079
Downloads
7,188
Views
Citations
This article belongs to the Special Issue on
Finite Element Method
Assessment of Public Health Risks Associated with Naphthalene Entering Residences and Commercial Space from Vapor Intrusion at MGP Sites
(Articles)
Robin DeHate
,
Brian Skelly
,
Marie Bourgeois
,
Giffe Johnson
,
Raymond Harbison
Journal of Environmental Protection
Vol.4 No.12A
,December 18, 2013
DOI:
10.4236/jep.2013.412A1002
3,868
Downloads
5,939
Views
Citations
This article belongs to the Special Issue on
Air Quality and Public Health
Mandibular changes associated with maxillary impaction and molar intrusion
(Articles)
Sondos Abuzinada
,
Fahad Alsulaimani
Open Journal of Stomatology
Vol.3 No.9
,December 25, 2013
DOI:
10.4236/ojst.2013.39085
5,128
Downloads
7,384
Views
Citations
False Positive Responses Optimization for Intrusion Detection System
(Articles)
Jalal Baayer
,
Boubker Regragui
,
Aziz Baayer
Journal of Information Security
Vol.5 No.2
,February 20, 2014
DOI:
10.4236/jis.2014.52003
5,222
Downloads
8,491
Views
Citations
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54015
5,881
Downloads
7,459
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,867
Downloads
5,830
Views
Citations
An Experimental Study on Measurement Methods of Bulk Density and Porosity of Rock Samples
(Articles)
Weiren Lin
,
Osamu Tadai
,
Manabu Takahashi
,
Daisaku Sato
,
Takehiro Hirose
,
Wataru Tanikawa
,
Yohei Hamada
,
Kentaro Hatakeda
Journal of Geoscience and Environment Protection
Vol.3 No.5
,July 17, 2015
DOI:
10.4236/gep.2015.35009
5,947
Downloads
8,270
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,456
Downloads
4,952
Views
Citations
Simulation of Seawater Intrusion in Coastal Confined Aquifer Using a Point Collocation Method Based Meshfree Model
(Articles)
Alice Thomas
,
T. I. Eldho
,
A. K. Rastogi
Journal of Water Resource and Protection
Vol.8 No.4
,April 29, 2016
DOI:
10.4236/jwarp.2016.84045
2,404
Downloads
3,871
Views
Citations
This article belongs to the Special Issue on
Research on Groundwater
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,765
Downloads
2,515
Views
Citations
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
(Articles)
Rathinam Gopal
,
Velusamy Parthasarathy
Circuits and Systems
Vol.7 No.11
,September 7, 2016
DOI:
10.4236/cs.2016.711298
1,250
Downloads
2,239
Views
Citations
Deterioration of Groundwater in Beirut Due to Seawater Intrusion
(Articles)
Mark Saadeh
,
Elie Wakim
Journal of Geoscience and Environment Protection
Vol.5 No.11
,November 17, 2017
DOI:
10.4236/gep.2017.511011
1,360
Downloads
3,549
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top