Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack
(Articles)
Koushicaa Sundar
,
Sanjeev Kumar
Journal of Information Security
Vol.7 No.4
,July 7, 2016
DOI:
10.4236/jis.2016.74018
2,838
Downloads
5,651
Views
Citations
Analysis of Computer Network Reliability and Criticality: Technique and Features
(Articles)
Iraj Elyasi-Komari
,
Anatoliy Gorbenko
,
Vyacheclav Kharchenko
,
Athanasios Mamalis
Int'l J. of Communications, Network and System Sciences
Vol.4 No.11
,October 31, 2011
DOI:
10.4236/ijcns.2011.411088
6,198
Downloads
12,117
Views
Citations
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
(Articles)
Linli Wang
,
Hu Wang
,
Hanlu Lei
Journal of Computer and Communications
Vol.11 No.5
,May 31, 2023
DOI:
10.4236/jcc.2023.115014
96
Downloads
461
Views
Citations
Hybrid Designing of a Neural System by Combining Fuzzy Logical Framework and PSVM for Visual Haze-Free Task
(Articles)
Hong Hu
,
Liang Pang
,
Dongping Tian
,
Zhongzhi Shi
International Journal of Intelligence Science
Vol.3 No.4
,October 8, 2013
DOI:
10.4236/ijis.2013.34016
3,532
Downloads
7,650
Views
Citations
A robust system for melanoma diagnosis using heterogeneous image databases
(Articles)
Khaled Taouil
,
Zied Chtourou
,
Nadra Ben Romdhane
Journal of Biomedical Science and Engineering
Vol.3 No.6
,June 25, 2010
DOI:
10.4236/jbise.2010.36080
4,726
Downloads
9,425
Views
Citations
RETRACTED:
Convolutional Neural Network and Bayesian Gaussian Process in Driving Anger Recognition
(Articles)
Bowen Cai
,
Wufei Ma
Engineering
Vol.12 No.7
,July 28, 2020
DOI:
10.4236/eng.2020.127037
393
Downloads
1,112
Views
Citations
The Online Assessment of Electric Distribution Network Load Capability
(Articles)
Haoming Liu
,
Zhenkun Li
,
Kun Yu
,
Xingying Chen
Journal of Electromagnetic Analysis and Applications
Vol.1 No.1
,March 12, 2009
DOI:
10.4236/jemaa.2009.11008
5,378
Downloads
9,913
Views
Citations
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
(Articles)
Danwei Chen
,
Xizhou Yu
,
Xianghui Dong
Wireless Sensor Network
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/wsn.2010.24049
5,507
Downloads
9,856
Views
Citations
Potential Vulnerability of Encrypted Messages: Decomposability of Discrete Logarithm Problems
(Articles)
Boris S. Verkhovsky
Int'l J. of Communications, Network and System Sciences
Vol.3 No.8
,August 31, 2010
DOI:
10.4236/ijcns.2010.38086
4,578
Downloads
7,970
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
9,997
Downloads
23,819
Views
Citations
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,356
Downloads
20,232
Views
Citations
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48064
5,997
Downloads
11,063
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,345
Downloads
8,529
Views
Citations
Enhanced Timestamp Discrepancy to Limit Impact of Replay Attacks in MANETs
(Articles)
Aziz Baayer
,
Nourddine Enneya
,
Mohammed Elkoutbi
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33028
4,852
Downloads
8,691
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,761
Downloads
8,556
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Web Security and Log Management: An Application Centric Perspective
(Articles)
Andrew Mwaura Kahonge
,
William Okello-Odongo
,
Evans K. Miriti
,
Elisha Abade
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43016
4,566
Downloads
8,038
Views
Citations
Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth
(Articles)
Lance Cleghorn
Journal of Information Security
Vol.4 No.3
,July 12, 2013
DOI:
10.4236/jis.2013.43017
10,342
Downloads
19,448
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,858
Downloads
5,913
Views
Citations
A Way to Set up Security Layer over Internet
(Articles)
Xiangyi Hu
,
Guifen Zhao
,
Guanning Xu
Journal of Computer and Communications
Vol.3 No.5
,May 25, 2015
DOI:
10.4236/jcc.2015.35022
2,519
Downloads
3,085
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,501
Downloads
2,621
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top