Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,502
Downloads
20,348
Views
Citations
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48064
6,117
Downloads
11,210
Views
Citations
Anomalous Network Packet Detection Using Data Stream Mining
(Articles)
Zachary Miller
,
William Deitrick
,
Wei Hu
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24016
6,897
Downloads
14,300
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
5,117
Downloads
9,865
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,435
Downloads
8,692
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,554
Downloads
5,317
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,720
Downloads
3,924
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
110
Downloads
510
Views
Citations
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
3,004
Downloads
5,868
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
1,039
Downloads
8,008
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
61
Downloads
398
Views
Citations
Role of Software Reliability Models in Performance Improvement and Management
(Articles)
Padmanabha Aital
,
P. Sashikala
Journal of Software Engineering and Applications
Vol.5 No.9
,September 14, 2012
DOI:
10.4236/jsea.2012.59086
5,171
Downloads
8,461
Views
Citations
Multi-Branch Fractional Multi-Bit Differential Detection of Continuous Phase Modulation with Decision Feedback
(Articles)
Jinhua Sun
,
Xiaojun Wu
Communications and Network
Vol.3 No.1
,February 25, 2011
DOI:
10.4236/cn.2011.31004
5,302
Downloads
9,134
Views
Citations
Influences on the Marking of Examinations
(Articles)
Christina Bermeitinger
,
Benjamin Unger
Psychology
Vol.5 No.2
,February 26, 2014
DOI:
10.4236/psych.2014.52014
6,090
Downloads
8,110
Views
Citations
Erratum to “Influences on the Marking of Examinations” [Psychology 5 (2014) 91-98]
(Articles)
Christina Bermeitinger
,
Benjamin Unger
Psychology
Vol.13 No.1
,January 19, 2022
DOI:
10.4236/psych.2022.131004
86
Downloads
510
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,310
Downloads
9,540
Views
Citations
Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks
(Articles)
Hua Wei
,
Hao Sun
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37080
7,806
Downloads
12,754
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,630
Downloads
10,971
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,923
Downloads
8,723
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,832
Downloads
9,704
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top