Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Hydro-Geochemical Characteristics of Groundwater Beneath the Gaza Strip
(Articles)
Muhammad Al-Khatib
,
Husam Al-Najar
Journal of Water Resource and Protection
Vol.3 No.5
,May 19, 2011
DOI:
10.4236/jwarp.2011.35043
7,939
Downloads
14,452
Views
Citations
Sea Water Intrusion Modeling in Rashid Area of Nile Delta (Egypt) via the Inversion of DC Resistivity Data
(Articles)
E. Tarabees
,
G. El-Qady
American Journal of Climate Change
Vol.5 No.2
,June 6, 2016
DOI:
10.4236/ajcc.2016.52014
2,250
Downloads
3,645
Views
Citations
Saline Intrusion Response to Sea Level Rise and Its Implications on Water and Coastal Management: A Case Study in Brazil
(Articles)
Raquel Toste
,
Paulo C. C. Rosman
,
Marcos A. V. de Freitas
Journal of Water Resource and Protection
Vol.9 No.5
,April 30, 2017
DOI:
10.4236/jwarp.2017.95033
1,438
Downloads
2,906
Views
Citations
Empirical Assessment of Coastal Environmental Vulnerability to Sea Level Rise
(Articles)
Martin Lee Collin
,
Abraham J. Melloul
Journal of Environmental Protection
Vol.5 No.12
,September 24, 2014
DOI:
10.4236/jep.2014.512116
3,283
Downloads
4,487
Views
Citations
The Influence of Seawater on a Coastal Aquifer in an International Protected Area, Göksu Delta Turkey
(Articles)
Zeynel Demirel
Journal of Water Resource and Protection
Vol.2 No.7
,July 23, 2010
DOI:
10.4236/jwarp.2010.27075
4,293
Downloads
7,974
Views
Citations
Water Intrusion in the Chesapeake Bay Region: Is It Caused by Climate-Induced Sea Level Rise?
(Articles)
Roger H. Bezdek
Journal of Geoscience and Environment Protection
Vol.5 No.8
,August 22, 2017
DOI:
10.4236/gep.2017.58020
1,313
Downloads
3,844
Views
Citations
The Differentiation of Phonological and Morphological Intrusion for the Two-Dimensional Orthography
(Articles)
Yang Lee
,
Claudia Carello
Psychology
Vol.7 No.9
,August 9, 2016
DOI:
10.4236/psych.2016.79123
2,024
Downloads
3,536
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
2,962
Downloads
4,803
Views
Citations
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents
(Articles)
Thomas Djotio Ndié
,
Claude Tangha
,
Guy Bertrand Fopak
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34035
4,478
Downloads
7,146
Views
Citations
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,273
Downloads
4,529
Views
Citations
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
(Articles)
Agbotiname L. Imoize
,
Taiwo Oyedare
,
Michael E. Otuokere
,
Sachin Shetty
Communications and Network
Vol.10 No.4
,November 23, 2018
DOI:
10.4236/cn.2018.104017
1,894
Downloads
4,185
Views
Citations
Sea Level across North Pacific’s Wide Warm Surface Current
(Articles)
Kern E. Kenyon
Natural Science
Vol.11 No.9
,September 12, 2019
DOI:
10.4236/ns.2019.119027
479
Downloads
935
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.6
,September 22, 2009
DOI:
10.4236/ijcns.2009.26063
5,743
Downloads
10,150
Views
Citations
Measuring Salinity within Shallow Piezometers:Comparison of Two Field Methods
(Articles)
Enrico Balugani
,
Marco Antonellini
Journal of Water Resource and Protection
Vol.2 No.3
,April 6, 2010
DOI:
10.4236/jwarp.2010.23029
7,292
Downloads
11,943
Views
Citations
Ground Water Vis-A-Vis Sea Water Intrusion Analysis for a Part of Limestone Tract of Gujarat Coast, India
(Articles)
Abhay K. Soni
,
Paras R. Pujari
Journal of Water Resource and Protection
Vol.2 No.5
,May 27, 2010
DOI:
10.4236/jwarp.2010.25053
7,199
Downloads
14,206
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,373
Downloads
8,140
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,243
Downloads
8,194
Views
Citations
Metallurgical Use of Heat Altered Coal: A Case Study
(Articles)
Debjani Nag
,
A.K. Singh
,
P.K. Banerjee
J. of Minerals and Materials Characterization and Eng.
Vol.8 No.7
,July 20, 2009
DOI:
10.4236/jmmce.2009.87047
6,565
Downloads
9,184
Views
Citations
Fluid Mechanics of Intrusives
(Articles)
Jónas Elíasson
International Journal of Geosciences
Vol.4 No.10A
,December 30, 2013
DOI:
10.4236/ijg.2013.410A002
2,667
Downloads
4,641
Views
Citations
This article belongs to the Special Issue on
Advances in Mathematical and Computational Geosciences
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,678
Downloads
6,459
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top