Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Sequential Tests for the Detection of Voice Activity and the Recognition of Cyber Exploits
(Articles)
Ehab Etellisi
,
P. Papantoni-Kazakos
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34022
4,053
Downloads
7,500
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.6
,September 22, 2009
DOI:
10.4236/ijcns.2009.26063
5,746
Downloads
10,157
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,376
Downloads
8,144
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,247
Downloads
8,202
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
,January 28, 2019
DOI:
10.4236/cn.2019.111002
807
Downloads
1,689
Views
Citations
Automatic Anomaly Detection of Respiratory Motion Based on Singular Spectrum Analysis
(Articles)
Jun’ichi Kotoku
,
Shinobu Kumagai
,
Ryouhei Uemura
,
Susumu Nakabayashi
,
Takenori Kobayashi
Int'l J. of Medical Physics, Clinical Eng. and Radiation Oncology
Vol.5 No.1
,February 29, 2016
DOI:
10.4236/ijmpcero.2016.51009
2,509
Downloads
3,490
Views
Citations
Stand-Alone Patient Reception and Referral System with Health Data Management
(Articles)
Ababacar Sadikh Faye
,
Ousmane Sow
,
Mame Andallah Diop
,
Jupiter Ndiaye
,
Youssou Traore
,
Oumar Diallo
Engineering
Vol.15 No.10
,October 24, 2023
DOI:
10.4236/eng.2023.1510042
66
Downloads
303
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,769
Downloads
14,302
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Proactive Security Mechanism and Design for Firewall
(Articles)
Saleem-Ullah Lar
,
Xiaofeng Liao
,
Aqeel ur Rehman
,
MA Qinglu
Journal of Information Security
Vol.2 No.3
,July 29, 2011
DOI:
10.4236/jis.2011.23012
7,015
Downloads
13,027
Views
Citations
Research on Track Fastener Service Status Detection Based on Improved Yolov4 Model
(Articles)
Jing He
,
Weiqi Wang
,
Nengpu Yang
Journal of Transportation Technologies
Vol.14 No.2
,April 15, 2024
DOI:
10.4236/jtts.2024.142013
18
Downloads
77
Views
Citations
The Application of Mixed Method in Developing a Cyber Terrorism Framework
(Articles)
Rabiah Ahmad
,
Zahri Yunos
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33026
7,613
Downloads
14,270
Views
Citations
Cyber Security Crimes, Ethics and a Suggested Algorithm to Overcome Cyber-Physical Systems Problems (CybSec1)
(Articles)
Abou_el_ela Abdou Hussien
Journal of Information Security
Vol.12 No.1
,January 15, 2021
DOI:
10.4236/jis.2021.121003
941
Downloads
3,814
Views
Citations
Identification and Validation of Social Media Socio-Technical Information Security Factors with Respect to Usable-Security Principles
(Articles)
Joe Mutebi
,
Margaret Kareyo
,
Umezuruike Chinecherem
,
Akampurira Paul
Journal of Computer and Communications
Vol.10 No.8
,August 17, 2022
DOI:
10.4236/jcc.2022.108004
171
Downloads
821
Views
Citations
SCADA Framework Incorporating MANET and IDP for Cyber Security of Residential Microgrid Communication Network
(Articles)
Goutham K. Chalamasetty
,
Paras Mandal
,
Tzu-Liang (Bill) Tseng
Smart Grid and Renewable Energy
Vol.7 No.3
,March 29, 2016
DOI:
10.4236/sgre.2016.73007
2,492
Downloads
3,998
Views
Citations
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
(Articles)
Jack Schafer
,
Marvin Karlins
Journal of Information Security
Vol.12 No.3
,July 9, 2021
DOI:
10.4236/jis.2021.123012
278
Downloads
1,465
Views
Citations
Enhancing Police Officers’ Cybercrime Investigation Skills Using a Checklist Tool
(Articles)
Abdelkhalek Ibrahim Alastal
,
Ashraf Hassan Shaqfa
Journal of Data Analysis and Information Processing
Vol.11 No.2
,April 4, 2023
DOI:
10.4236/jdaip.2023.112008
234
Downloads
2,180
Views
Citations
Energy-Efficient Data Collection in Wireless Sensor Networks
(Articles)
Mohammad Hossein Anisi
,
Abdul Hanan Abdullah
,
Shukor Abd Razak
Wireless Sensor Network
Vol.3 No.10
,October 12, 2011
DOI:
10.4236/wsn.2011.310036
8,129
Downloads
17,068
Views
Citations
Hadoop Distributed File System Security Challenges and Examination of Unauthorized Access Issue
(Articles)
Wahid Rajeh
Journal of Information Security
Vol.13 No.2
,February 16, 2022
DOI:
10.4236/jis.2022.132002
370
Downloads
2,446
Views
Citations
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
203
Downloads
1,754
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,552
Downloads
14,702
Views
Citations
<
...
4
5
6
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top