Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,555
Downloads
5,323
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
33
Downloads
162
Views
Citations
Performance Assessment of Islanding Detection for Mul-ti-inverter Grid-connected Photovoltaic Systems
(Articles)
Xing Zhang
,
Dong Xie
Energy and Power Engineering
Vol.5 No.4B
,November 21, 2013
DOI:
10.4236/epe.2013.54B287
7,136
Downloads
8,817
Views
Citations
Comprehensive Modulation and Classification of Faults and Analysis Their Effect in DC Side of Photovoltaic System
(Articles)
Mehrdad Davarifar
,
Abdelhamid Rabhi
,
Ahmed El Hajjaji
Energy and Power Engineering
Vol.5 No.4B
,October 15, 2013
DOI:
10.4236/epe.2013.54B045
8,604
Downloads
11,225
Views
Citations
Machine-to-Machine Collaboration Utilizing Internet of Things and Machine Learning
(Articles)
Mohammed Misbahuddin
,
Abul Kashem Mohammed Azad
,
Veysel Demir
Advances in Internet of Things
Vol.13 No.4
,October 30, 2023
DOI:
10.4236/ait.2023.134008
283
Downloads
1,474
Views
Citations
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
(Articles)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31003
5,337
Downloads
9,572
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,925
Downloads
8,729
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
3,004
Downloads
5,870
Views
Citations
Anomaly Detection of Store Cash Register Data Based on Improved LOF Algorithm
(Articles)
Ke Long
,
Yuhang Wu
,
Yufeng Gui
Applied Mathematics
Vol.9 No.6
,June 29, 2018
DOI:
10.4236/am.2018.96049
1,200
Downloads
2,454
Views
Citations
Survey and Proposal of an Adaptive Anomaly Detection Algorithm for Periodic Data Streams
(Articles)
Zirije Hasani
,
Samedin Krrabaj
Journal of Computer and Communications
Vol.7 No.8
,August 29, 2019
DOI:
10.4236/jcc.2019.78004
1,140
Downloads
3,245
Views
Citations
Financial Anomalies and Creditworthiness: A Python-Driven Machine Learning Approach Using Mahalanobis Distance for ISE-Listed Companies in the Production and Manufacturing Sector
(Articles)
Hasan Demirhan
Journal of Financial Risk Management
Vol.13 No.1
,January 25, 2024
DOI:
10.4236/jfrm.2024.131001
275
Downloads
1,279
Views
Citations
Machine Learning Models for Heterogenous Network Security Anomaly Detection
(Articles)
Mercy Diligence Ogah
,
Joe Essien
,
Martin Ogharandukun
,
Monday Abdullahi
Journal of Computer and Communications
Vol.12 No.6
,June 25, 2024
DOI:
10.4236/jcc.2024.126004
116
Downloads
631
Views
Citations
Research on the Application of Machine Learning in Financial Anomaly Detection
(Articles)
Qiye Wang
iBusiness
Vol.16 No.4
,November 28, 2024
DOI:
10.4236/ib.2024.164012
61
Downloads
392
Views
Citations
A Wind Turbine Anomaly Detection Method Based on Improved Auxiliary Classifier Generative Adversarial Networks
(Articles)
Xiangyan Meng
,
Jiyu Zeng
,
Zuquan Zhang
,
Peng Luo
,
Lin Yang
Open Journal of Applied Sciences
Vol.14 No.12
,December 31, 2024
DOI:
10.4236/ojapps.2024.1412242
23
Downloads
166
Views
Citations
Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
(Articles)
Rabeb Zarai
,
Mnaouer Kachout
,
Mohamed A. G. Hazber
,
Mohammed A. Mahdi
Open Access Library Journal
Vol.7 No.3
,March 25, 2020
DOI:
10.4236/oalib.1106151
1,170
Downloads
3,666
Views
Citations
Video Based Vehicle Detection and its Application in Intelligent Transportation Systems
(Articles)
Naveen Chintalacheruvu
,
Venkatesan Muthukumar
Journal of Transportation Technologies
Vol.2 No.4
,October 31, 2012
DOI:
10.4236/jtts.2012.24033
10,528
Downloads
21,114
Views
Citations
Real-Time Lane Detection for Driver Assistance System
(Articles)
Takialddin Al Smadi
Circuits and Systems
Vol.5 No.8
,August 8, 2014
DOI:
10.4236/cs.2014.58022
4,275
Downloads
6,937
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,721
Downloads
3,929
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
110
Downloads
511
Views
Citations
Machine Learning for Identifying Harmful Online Behavior: A Cyberbullying Overview
(Articles)
Rikin Shrestha
,
Rushit Dave
Journal of Computer and Communications
Vol.13 No.1
,January 22, 2025
DOI:
10.4236/jcc.2025.131003
69
Downloads
625
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top