Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,500
Downloads
2,619
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
244
Downloads
1,309
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
69
Downloads
407
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
,September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,478
Downloads
5,200
Views
Citations
Research on the Anomaly Detection Method in Intelligent Patrol Based on Big Data Analysis
(Articles)
Xiaoqing Deng
Journal of Computer and Communications
Vol.7 No.8
,August 21, 2019
DOI:
10.4236/jcc.2019.78001
619
Downloads
1,607
Views
Citations
Misbehavior Detection Method by Time Series Change of Vehicle Position in Vehicle-to-Everything Communication
(Articles)
Toshiki Okamura
,
Kenya Sato
Journal of Transportation Technologies
Vol.11 No.2
,April 29, 2021
DOI:
10.4236/jtts.2021.112018
402
Downloads
1,387
Views
Citations
READA: Redundancy Elimination for Accurate Data Aggregation in Wireless Sensor Networks
(Articles)
Kavi Khedo
,
Rubeena Doomun
,
Sonum Aucharuz
Wireless Sensor Network
Vol.2 No.4
,April 23, 2010
DOI:
10.4236/wsn.2010.24041
6,329
Downloads
13,274
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
4,962
Downloads
9,711
Views
Citations
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior
(Articles)
Faisal Alghayadh
,
Debatosh Debnath
Advances in Internet of Things
Vol.11 No.1
,January 28, 2021
DOI:
10.4236/ait.2021.111002
1,268
Downloads
5,944
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
121
Downloads
620
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,733
Downloads
11,233
Views
Citations
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
,November 12, 2015
DOI:
10.4236/iim.2015.76023
5,225
Downloads
6,210
Views
Citations
This article belongs to the Special Issue on
Cyber Security
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,440
Downloads
2,635
Views
Citations
Combining Artificial Immune System and Clustering Analysis: A Stock Market Anomaly Detection Model
(Articles)
Liam Close
,
Rasha Kashef
Journal of Intelligent Learning Systems and Applications
Vol.12 No.4
,October 14, 2020
DOI:
10.4236/jilsa.2020.124005
1,925
Downloads
4,572
Views
Citations
Multidimensional Design Paradigms for Data Warehouses: A Systematic Mapping Study
(Articles)
Ania Cravero
,
Samuel Sepúlveda
Journal of Software Engineering and Applications
Vol.7 No.1
,January 17, 2014
DOI:
10.4236/jsea.2014.71006
5,047
Downloads
8,293
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,324
Downloads
3,773
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
68
Downloads
398
Views
Citations
A Lightweight Data Aggregation Protocol in Wireless Sensor Networks for the Protection of Ancient Sites
(Articles)
Xiaojiang Chen
,
Dingyi Fang
,
Xueqing Huang
,
Baoying Liu
,
Xiaoqiong Gong
,
Wenbo Wang
,
Alessio Perrone
Journal of Sensor Technology
Vol.1 No.4
,December 5, 2011
DOI:
10.4236/jst.2011.14013
4,110
Downloads
8,585
Views
Citations
A Tree Based Data Aggregation Scheme for Wireless Sensor Networks Using GA
(Articles)
Ali Norouzi
,
Faezeh Sadat Babamir
,
Zeynep Orman
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48028
5,406
Downloads
10,079
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,658
Downloads
16,011
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top