Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,681
Downloads
6,467
Views
Citations
Petrology, Geochemistry and Tectonomagmatic Setting of Neshveh Intrusion (NW Saveh)
(Articles)
Reza Keshavarzi
,
Dariush Esmaili
,
Mehdi Rezaei Kahkhaei
,
Mir Ali Asghar Mokhtari
,
Reza Jabari
Open Journal of Geology
Vol.4 No.5
,May 2, 2014
DOI:
10.4236/ojg.2014.45013
6,031
Downloads
9,535
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
,September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,478
Downloads
5,200
Views
Citations
Assessment of Saltwater Intrusion and Discharges to a Wetland with a 3D Transient Variable Density Flow Model: The Coastal Plane Oropesa-Torreblanca Aquifer, Spain
(Articles)
Ignacio Sanz-Garrido
,
José E. Capilla
Journal of Water Resource and Protection
Vol.7 No.9
,July 14, 2015
DOI:
10.4236/jwarp.2015.79062
3,950
Downloads
5,015
Views
Citations
Numerical Simulation and Prediction of Groundwater Flow in a Coastal Aquifer of Southern India
(Articles)
S. Sathish
,
L. Elango
Journal of Water Resource and Protection
Vol.7 No.17
,December 25, 2015
DOI:
10.4236/jwarp.2015.717122
5,115
Downloads
6,562
Views
Citations
Assessing the Seawater Intrusion Due to Beach Wells in the Desalination Plant
(Articles)
Yunes Mogheir
Journal of Geoscience and Environment Protection
Vol.4 No.12
,December 8, 2016
DOI:
10.4236/gep.2016.412003
1,723
Downloads
2,762
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
,January 28, 2019
DOI:
10.4236/cn.2019.111002
807
Downloads
1,690
Views
Citations
Evaluation of Sea-Water Intrusion in Coastal Aquifers Using both Numerical Methods and Causal Research: A Case Study of Mombasa, Kenya
(Articles)
Dorcas Mutheu Musingi
,
Michael Mbindyo Munywoki
,
Benjamin Musyimi Musingi
Engineering
Vol.13 No.7
,July 16, 2021
DOI:
10.4236/eng.2021.137028
374
Downloads
1,929
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
9,996
Downloads
23,813
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,769
Downloads
14,302
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
203
Downloads
1,754
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,552
Downloads
14,702
Views
Citations
Optimal Extraction of Groundwater in Gaza Coastal Aquifer
(Articles)
Khalid QAHMAN
,
Abdelkader LARABI
,
Driss OUAZAR
,
Ahmed NAJI
,
Alexander H.-D. CHENG
Journal of Water Resource and Protection
Vol.1 No.4
,October 16, 2009
DOI:
10.4236/jwarp.2009.14030
7,267
Downloads
13,089
Views
Citations
Hydro-Geochemical Characteristics of Groundwater Beneath the Gaza Strip
(Articles)
Muhammad Al-Khatib
,
Husam Al-Najar
Journal of Water Resource and Protection
Vol.3 No.5
,May 19, 2011
DOI:
10.4236/jwarp.2011.35043
7,948
Downloads
14,467
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,210
Downloads
11,345
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,833
Downloads
9,066
Views
Citations
The Role of Fluids in Promoting Seismic Activity in Active Spreading Centers of the Salton Trough, California, USA
(Articles)
Musa Hussein
,
Aaron A. Velasco
,
Laura Serpa
,
Diane Doser
International Journal of Geosciences
Vol.3 No.2
,May 23, 2012
DOI:
10.4236/ijg.2012.32032
4,045
Downloads
6,580
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,875
Downloads
9,212
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,550
Downloads
8,438
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,733
Downloads
11,233
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top