Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,355
Downloads
8,472
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,783
Downloads
14,076
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Efficient Performance Analysis of Spectrum Sensing for Cascaded Multihop Network over Nagakami-m Fading Channels
(Articles)
Deepti Kakkar
,
Arun Khosla
,
Moin Uddin
Engineering
Vol.6 No.2
,February 10, 2014
DOI:
10.4236/eng.2014.62010
4,388
Downloads
6,054
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,696
Downloads
13,850
Views
Citations
An Application of Canny Edge Detection Algorithm to Rail Thermal Image Fault Detection
(Articles)
Libo Cai
,
Yu Ma
,
Tangming Yuan
,
Haifeng Wang
,
Tianhua Xu
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311004
2,993
Downloads
4,354
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,455
Downloads
4,950
Views
Citations
An Improved Moving Object Detection Algorithm Based on Gaussian Mixture Models
(Articles)
Xuegang Hu
,
Jiamin Zheng
Open Journal of Applied Sciences
Vol.6 No.7
,July 27, 2016
DOI:
10.4236/ojapps.2016.67045
2,349
Downloads
4,035
Views
Citations
Optimization of DNA Staining Technology for Development of Autonomous Microbe Sensor for Injection Seawater Systems
(Articles)
Mohammed A. Al-Moniee
,
Xiangyang Zhu
,
Lone Tang
,
Susanne Juhler
,
Fuad I. Nuwaiser
,
Peter F. Sanders
,
Fahad N. Al-Abeedi
Journal of Sensor Technology
Vol.6 No.3
,August 11, 2016
DOI:
10.4236/jst.2016.63003
2,292
Downloads
3,186
Views
Citations
Code Clone Detection Method Based on the Combination of Tree-Based and Token-Based Methods
(Articles)
Ryota Ami
,
Hirohide Haga
Journal of Software Engineering and Applications
Vol.10 No.13
,December 28, 2017
DOI:
10.4236/jsea.2017.1013051
1,297
Downloads
2,814
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,627
Downloads
3,514
Views
Citations
A Review of Researches on Deep Learning in Remote Sensing Application
(Articles)
Ming Zhu
,
Yongning He
,
Qingyu He
International Journal of Geosciences
Vol.10 No.1
,January 10, 2019
DOI:
10.4236/ijg.2019.101001
2,446
Downloads
6,562
Views
Citations
In-Vehicle Stereo Vision Systems with Improved Ant Colony Optimization Based Lane Detection: A Solution to Accidents Involving Large Goods Vehicles Due to Blind Spots
(Articles)
Ibrahim Adamu Umar
,
Shengbo Hu
,
Hongqiu Luo
Open Journal of Applied Sciences
Vol.12 No.3
,March 22, 2022
DOI:
10.4236/ojapps.2022.123025
163
Downloads
815
Views
Citations
Fast Object Extraction and Euler Number on Block Represented Images
(Articles)
Iraklis M. Spiliotis
,
Alexandros S. Peppas
,
Nikolaos D. Karampasis
,
Yiannis S. Boutalis
Journal of Data Analysis and Information Processing
Vol.10 No.2
,March 31, 2022
DOI:
10.4236/jdaip.2022.102006
176
Downloads
1,795
Views
Citations
Application of Dual-Energy X-Ray Image Detection of Dangerous Goods Based on YOLOv7
(Articles)
Baosheng Liu
,
Fei Wang
,
Ming Gao
,
Lei Zhao
Journal of Computer and Communications
Vol.11 No.7
,July 31, 2023
DOI:
10.4236/jcc.2023.117013
89
Downloads
453
Views
Citations
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
(Articles)
Matthew Abu John
,
Ibukunoluwa Bankole
,
Oluwatayo Ajayi-Moses
,
Tofunmi Ijila
,
Timilehin Jeje
,
Patil Lalit
American Journal of Plant Sciences
Vol.14 No.11
,November 17, 2023
DOI:
10.4236/ajps.2023.1411086
149
Downloads
803
Views
Citations
Compression of ECG signal using video codec technology-like scheme
(Articles)
Dihu Chen
,
Sheng Yang
Journal of Biomedical Science and Engineering
Vol.1 No.1
,June 6, 2008
DOI:
10.4236/jbise.2008.11004
6,215
Downloads
11,979
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,583
Downloads
14,487
Views
Citations
Two-Tier GCT Based Approach for Attack Detection
(Articles)
Zhiwen Wang
,
Qin Xia
,
Ke Lu
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11009
4,623
Downloads
8,135
Views
Citations
On the Scalable Fairness and Efficient Active Queue Management of RED
(Articles)
Hui WANG
,
Xiao-Hui LIN
,
Kai-Yu ZHOU
,
Nin XIE
,
Hui LI
Int'l J. of Communications, Network and System Sciences
Vol.2 No.1
,February 26, 2009
DOI:
10.4236/ijcns.2009.21009
5,941
Downloads
10,059
Views
Citations
Target Detection in Three-Dimension Sensor Networks Based on Clifford Algebra
(Articles)
Tiancheng HE
,
Weixin XIE
,
Wenming CAO
Wireless Sensor Network
Vol.1 No.2
,July 10, 2009
DOI:
10.4236/wsn.2009.12013
5,066
Downloads
9,397
Views
Citations
<
...
8
9
10
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top