Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,684
Downloads
16,089
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
4,888
Downloads
8,314
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,214
Downloads
11,357
Views
Citations
Real-Time Road Traffic Anomaly Detection
(Articles)
Jamal Raiyn
,
Tomer Toledo
Journal of Transportation Technologies
Vol.4 No.3
,July 31, 2014
DOI:
10.4236/jtts.2014.43023
5,324
Downloads
8,197
Views
Citations
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
(Articles)
Yasamin Alagrash
,
Azhar Drebee
,
Nedda Zirjawi
Journal of Information Security
Vol.11 No.1
,December 10, 2019
DOI:
10.4236/jis.2020.111001
927
Downloads
2,267
Views
Citations
Detection and Evaluation of Adverse Drug Reaction Signals of Antidepressants Based on FDA Adverse Event Reporting System Database
(Articles)
Chao Ran
,
Hu Zhou
,
Chao Tan
,
Juntao Tan
,
Zhengyu Zhang
,
Wenlong Zhao
Open Journal of Depression
Vol.9 No.2
,May 27, 2020
DOI:
10.4236/ojd.2020.92002
953
Downloads
3,027
Views
Citations
A Hybrid DNN-RBFNN Model for Intrusion Detection System
(Articles)
Wafula Maurice Oboya
,
Anthony Waititu Gichuhi
,
Anthony Wanjoya
Journal of Data Analysis and Information Processing
Vol.11 No.4
,November 1, 2023
DOI:
10.4236/jdaip.2023.114019
77
Downloads
478
Views
Citations
Online Detection of Network Traffic Anomalies Using Degree Distributions
(Articles)
Wuzuo WANG
,
Weidong WU
Int'l J. of Communications, Network and System Sciences
Vol.3 No.2
,March 1, 2010
DOI:
10.4236/ijcns.2010.32025
6,161
Downloads
12,080
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,683
Downloads
15,975
Views
Citations
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,639
Downloads
9,513
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
700
Downloads
10,836
Views
Citations
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology
(Articles)
Emad Felemban
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65028
12,499
Downloads
23,190
Views
Citations
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
(Articles)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31003
5,212
Downloads
9,412
Views
Citations
Privacy Preserving Two-Party Hierarchical Clustering Over Vertically Partitioned Dataset
(Articles)
Animesh Tripathy
,
Ipsa De
Journal of Software Engineering and Applications
Vol.6 No.5B
,October 12, 2013
DOI:
10.4236/jsea.2013.65B006
3,505
Downloads
5,101
Views
Citations
Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks
(Articles)
Hua Wei
,
Hao Sun
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37080
7,676
Downloads
12,658
Views
Citations
False Positive Responses Optimization for Intrusion Detection System
(Articles)
Jalal Baayer
,
Boubker Regragui
,
Aziz Baayer
Journal of Information Security
Vol.5 No.2
,February 20, 2014
DOI:
10.4236/jis.2014.52003
5,215
Downloads
9,208
Views
Citations
A Method for the Detection of Decrease in Power in PV Systems Using Satellite Data
(Articles)
Kota Kawasaki
,
Keiichi Okajima
Smart Grid and Renewable Energy
Vol.10 No.1
,January 15, 2019
DOI:
10.4236/sgre.2019.101001
1,120
Downloads
1,946
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,381
Downloads
8,160
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,257
Downloads
8,224
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
,January 28, 2019
DOI:
10.4236/cn.2019.111002
819
Downloads
1,711
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top