Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
(Articles)
Jafar Alqatawna
,
Hossam Faris
,
Khalid Jaradat
,
Malek Al-Zewairi
,
Omar Adwan
Int'l J. of Communications, Network and System Sciences
Vol.8 No.5
,April 30, 2015
DOI:
10.4236/ijcns.2015.85014
4,143
Downloads
5,792
Views
Citations
An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing
(Articles)
Siti-Hajar-Aminah Ali
,
Seiichi Ozawa
,
Junji Nakazato
,
Tao Ban
,
Jumpei Shimamura
Journal of Intelligent Learning Systems and Applications
Vol.7 No.2
,April 22, 2015
DOI:
10.4236/jilsa.2015.72005
5,223
Downloads
6,729
Views
Citations
Reduce Malicious Activity in Trusted Programs
(Articles)
Elliot Ito
,
Depeng Li
Journal of Computer and Communications
Vol.10 No.10
,October 20, 2022
DOI:
10.4236/jcc.2022.1010003
71
Downloads
474
Views
Citations
Presurgical Mapping of Brain Tumors Using Statistical Probabilistic Anatomical Maps
(Articles)
Jin Su Kim
,
Gi Jeong Cheon
,
Sang Moo Lim
Journal of Biomedical Science and Engineering
Vol.8 No.9
,September 24, 2015
DOI:
10.4236/jbise.2015.89061
2,952
Downloads
3,740
Views
Citations
A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam
(Articles)
Samir A. Elsagheer Mohamed
Int'l J. of Communications, Network and System Sciences
Vol.5 No.7
,July 25, 2012
DOI:
10.4236/ijcns.2012.57051
4,967
Downloads
8,138
Views
Citations
Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
(Articles)
S. Gopalakrishnan
,
P. Mohan Kumar
Circuits and Systems
Vol.7 No.6
,May 12, 2016
DOI:
10.4236/cs.2016.76064
2,464
Downloads
4,302
Views
Citations
Malicious Nodes Detection in MANET Using Back-Off Clustering Approach
(Articles)
A. R. Rajeswari
,
K. Kulothungan
,
S. Ganapathy
,
A. Kannan
Circuits and Systems
Vol.7 No.8
,June 30, 2016
DOI:
10.4236/cs.2016.78180
1,960
Downloads
3,654
Views
Citations
Considerations for Planning a Multi-Platform Energy Utility System
(Articles)
Yahav Biran
,
Joel Dubow
,
Sudeep Pasricha
,
George Collins
,
John M. Borky
Energy and Power Engineering
Vol.9 No.12
,November 9, 2017
DOI:
10.4236/epe.2017.912046
883
Downloads
1,796
Views
Citations
This article belongs to the Special Issue on
Power System Protection
Two Approaches on Implementation of CBR and CRM Technologies to the Spam Filtering Problem
(Articles)
Rasim Alguliyev
,
Saadat Nazirova
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31002
4,184
Downloads
8,644
Views
Citations
Optimizing Feedforward Neural Networks Using Biogeography Based Optimization for E-Mail Spam Identification
(Articles)
Ali Rodan
,
Hossam Faris
,
Ja’far Alqatawna
Int'l J. of Communications, Network and System Sciences
Vol.9 No.1
,January 25, 2016
DOI:
10.4236/ijcns.2016.91002
5,571
Downloads
7,172
Views
Citations
A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks
(Articles)
Seo Hyun Oh
,
Chan O. Hong
,
Yoon Hwa Choi
Wireless Sensor Network
Vol.4 No.3
,March 30, 2012
DOI:
10.4236/wsn.2012.43012
6,685
Downloads
12,884
Views
Citations
Neighbor-Based Malicious Node Detection in Wireless Sensor Networks
(Articles)
Sung-Jib Yim
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.4 No.9
,September 20, 2012
DOI:
10.4236/wsn.2012.49032
5,798
Downloads
10,422
Views
Citations
A New Method for Sensing Cognitive Radio Network under Malicious Attacker
(Articles)
Shaahin Tabatabaee
,
Vahid Tabataba Vakili
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61007
4,451
Downloads
6,618
Views
Citations
Performance of Analysis Cognitive Radio with Cooperative Sensing under Malicious Attacks over Nakagami Faded Channels
(Articles)
Hagar O. Shazly
,
Asmaa Saafan
,
Hesham El Badawy
,
Hadia M. El Hennawy
Wireless Engineering and Technology
Vol.7 No.2
,April 12, 2016
DOI:
10.4236/wet.2016.72007
2,826
Downloads
3,669
Views
Citations
Malware Detection Using Deep Learning
(Articles)
Achi Harrisson Thiziers
,
Koné Tiémoman
,
N’guessan Behou Gérard
,
Traoré Tiémoko Qouddouss Kabir
Open Journal of Applied Sciences
Vol.13 No.12
,December 29, 2023
DOI:
10.4236/ojapps.2023.1312193
117
Downloads
492
Views
Citations
Survey on Spam Filtering Techniques
(Articles)
Saadat Nazirova
Communications and Network
Vol.3 No.3
,August 10, 2011
DOI:
10.4236/cn.2011.33019
9,553
Downloads
19,298
Views
Citations
A Heuristic Reputation Based System to Detect Spam Activities in a Social Networking Platform, HRSSSNP
(Articles)
Manoj Rameshchandra Thakur
,
Sugata Sanyal
Social Networking
Vol.2 No.1
,January 30, 2013
DOI:
10.4236/sn.2013.21005
2,933
Downloads
5,559
Views
Citations
Deep Neural Network Based Spam Email Classification Using Attention Mechanisms
(Articles)
Md. Tofael Ahmed
,
Mariam Akter
,
Md. Saifur Rahman
,
Maqsudur Rahman
,
Pintu Chandra Paul
,
Miss. Nargis Parvin
,
Almas Hossain Antar
Journal of Intelligent Learning Systems and Applications
Vol.15 No.4
,November 30, 2023
DOI:
10.4236/jilsa.2023.154010
110
Downloads
602
Views
Citations
A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks
(Articles)
Ehsan Moeen Taghavi
,
Bahman Abolhassani
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48062
5,480
Downloads
10,292
Views
Citations
Malicious Node Detection Using Confidence Level Evaluation in a Grid-Based Wireless Sensor Network
(Articles)
Min-Cheol Shin
,
Yoon-Hwa Choi
Wireless Sensor Network
Vol.5 No.3
,March 29, 2013
DOI:
10.4236/wsn.2013.53007
5,136
Downloads
8,991
Views
Citations
<
1
2
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top