Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
An Experimental Study on Measurement Methods of Bulk Density and Porosity of Rock Samples
(Articles)
Weiren Lin
,
Osamu Tadai
,
Manabu Takahashi
,
Daisaku Sato
,
Takehiro Hirose
,
Wataru Tanikawa
,
Yohei Hamada
,
Kentaro Hatakeda
Journal of Geoscience and Environment Protection
Vol.3 No.5
,July 17, 2015
DOI:
10.4236/gep.2015.35009
6,232
Downloads
9,377
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,571
Downloads
5,383
Views
Citations
Simulation of Seawater Intrusion in Coastal Confined Aquifer Using a Point Collocation Method Based Meshfree Model
(Articles)
Alice Thomas
,
T. I. Eldho
,
A. K. Rastogi
Journal of Water Resource and Protection
Vol.8 No.4
,April 29, 2016
DOI:
10.4236/jwarp.2016.84045
2,483
Downloads
4,177
Views
Citations
This article belongs to the Special Issue on
Research on Groundwater
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,835
Downloads
2,736
Views
Citations
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
(Articles)
Rathinam Gopal
,
Velusamy Parthasarathy
Circuits and Systems
Vol.7 No.11
,September 7, 2016
DOI:
10.4236/cs.2016.711298
1,323
Downloads
2,602
Views
Citations
Deterioration of Groundwater in Beirut Due to Seawater Intrusion
(Articles)
Mark Saadeh
,
Elie Wakim
Journal of Geoscience and Environment Protection
Vol.5 No.11
,November 17, 2017
DOI:
10.4236/gep.2017.511011
1,458
Downloads
4,068
Views
Citations
Investigation of the Source Relationship between Benzene Vapor and Alkylate-Containing Light Non-Aqueous Phase Liquid at Adjacent Industrial Facilities
(Articles)
Frank S. Muramoto
,
Jun Lu
Journal of Environmental Protection
Vol.9 No.5
,May 30, 2018
DOI:
10.4236/jep.2018.95036
756
Downloads
1,558
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,729
Downloads
3,981
Views
Citations
Orthodontic Intrusion of over Erupted Permanent Maxillary Molars Using Temporary Anchorage Devices
(Articles)
Mohammad Jaradat
,
Waddah Arda
Open Journal of Stomatology
Vol.9 No.5
,May 13, 2019
DOI:
10.4236/ojst.2019.95010
1,590
Downloads
4,851
Views
Citations
Baddeleyite from Large Complex Deposits: Significance for Archean-Paleozoic Plume Processes in the Arctic Region (NE Fennoscandian Shield) Based on U-Pb (ID-TIMS) and LA-ICP-MS Data
(Articles)
Tamara Bayanova
,
Viktor Subbotin
,
Svetlana Drogobuzhskaya
,
Anatoliy Nikolaev
,
Ekaterina Steshenko
Open Journal of Geology
Vol.9 No.8
,August 30, 2019
DOI:
10.4236/ojg.2019.98031
710
Downloads
1,645
Views
Citations
Petrography and Mineralogy of the Quartz and Quartz-Feldspar Sulphide Veins in the Pan-African Syenitic Massif of Guider (North Cameroon)
(Articles)
Marguerite Boyabe
,
Daouda Dawai
,
Rigobert Tchameni
,
Periclex Martial Fosso Tchunte
Open Journal of Geology
Vol.10 No.3
,March 20, 2020
DOI:
10.4236/ojg.2020.103013
802
Downloads
3,714
Views
Citations
Pore Structure Characteristics of Taiyuan Formation Shale in Qinshui Basin
(Articles)
Hongyue Duan
,
Wenkai Zhang
,
Xinquan Wang
,
Kaizi Jiang
,
Tingting Huang
Journal of Geoscience and Environment Protection
Vol.8 No.7
,July 27, 2020
DOI:
10.4236/gep.2020.87007
434
Downloads
995
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
691
Downloads
3,270
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
911
Downloads
11,838
Views
Citations
Modeling of the Saltwater Intrusion Using the Level Set Method. Application to Henry’s Problem
(Articles)
Joachna Meya Loua-Bouayi
,
Christian Tathy
,
Adolphe Kimbonguila Manounou
Computational Water, Energy, and Environmental Engineering
Vol.11 No.1
,January 6, 2022
DOI:
10.4236/cweee.2022.111002
293
Downloads
1,129
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
346
Downloads
1,894
Views
Citations
An Activity Recognition System at Home Based on CO
2
Sensors
(Articles)
Hiroyuki Matsubara
Journal of Computer and Communications
Vol.11 No.11
,November 24, 2023
DOI:
10.4236/jcc.2023.1111004
156
Downloads
562
Views
Citations
Stochastic Simulation of Saline Intrusion in the Coastal Aquifer of Saloum, Senegal
(Articles)
Seyni Ndoye
,
Amadou Sarr
,
Mathieu Le Coz
,
Cheikh Becaye Gaye
,
Moumtaz Razack
,
Philippe Le Coustumer
Journal of Environmental Protection
Vol.15 No.8
,August 20, 2024
DOI:
10.4236/jep.2024.158049
64
Downloads
493
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
121
Downloads
563
Views
Citations
Lebanon’s Water Resources Salinity Crisis
(Articles)
Mark Saadeh
,
Gebran Karam
Journal of Geoscience and Environment Protection
Vol.12 No.12
,December 19, 2024
DOI:
10.4236/gep.2024.1212006
45
Downloads
318
Views
Citations
<
...
5
6
7
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top