Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
,November 12, 2015
DOI:
10.4236/iim.2015.76023
5,305
Downloads
6,347
Views
Citations
This article belongs to the Special Issue on
Cyber Security
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
,June 8, 2016
DOI:
10.4236/cs.2016.78115
1,537
Downloads
2,432
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
,November 22, 2024
DOI:
10.4236/ijids.2024.62002
89
Downloads
495
Views
Citations
Use of Machine Learning and Deep Learning in Intrusion Detection for IoT
(Articles)
Muhannad Almohaimeed
,
Rasha Alyoubi
,
Afnan Aljohani
,
Mashael Alhaidari
,
Faisal Albalwy
,
Fahad Ghabban
,
Ibrahim Alfadli
,
Omair Ameerbakhsh
Advances in Internet of Things
Vol.15 No.2
,April 1, 2025
DOI:
10.4236/ait.2025.152002
82
Downloads
414
Views
Citations
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations
(Articles)
Jackson Norris
,
Vijay K. Madisetti
Journal of Information Security
Vol.16 No.2
,April 8, 2025
DOI:
10.4236/jis.2025.162014
34
Downloads
297
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
5,117
Downloads
9,864
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,554
Downloads
5,316
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,720
Downloads
3,922
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
440
Downloads
2,254
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A WebGIS Solution for Estimation Landuse Affected by Salinity Intrusion: Case Study in Ben Tre Province, Vietnam
(Articles)
Tran Thai Binh
,
Ho Lam Truong
,
Do Thanh Long
Journal of Geographic Information System
Vol.12 No.3
,June 18, 2020
DOI:
10.4236/jgis.2020.123012
591
Downloads
2,108
Views
Citations
Fault Tolerance Limits and Input Stimulus Selection Using an Implemented FPGA-Based Testing System
(Articles)
Papakostas K. Dimitrios
,
Pouros P. Sotirios
,
Vassios D. Vassilios
Journal of Computer and Communications
Vol.2 No.13
,November 19, 2014
DOI:
10.4236/jcc.2014.213003
2,787
Downloads
3,471
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,310
Downloads
9,540
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,922
Downloads
8,719
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,831
Downloads
9,702
Views
Citations
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology
(Articles)
Emad Felemban
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65028
12,865
Downloads
22,309
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,948
Downloads
6,058
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
884
Downloads
11,694
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
337
Downloads
1,770
Views
Citations
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
(Articles)
Raed Alharthi
Journal of Computer and Communications
Vol.13 No.2
,February 28, 2025
DOI:
10.4236/jcc.2025.132016
56
Downloads
246
Views
Citations
A Sphere Detection Based Adaptive MIMO Detection Algorithm for LTE-A System
(Articles)
Xuanli Wu
,
Lukuan Sun
,
Mingxin Luo
Communications and Network
Vol.5 No.2B
,July 10, 2013
DOI:
10.4236/cn.2013.52B005
3,187
Downloads
4,907
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top