Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Security: A Core Issue in Mobile
Ad hoc
Networks
(Articles)
Asif Shabbir
,
Fayyaz Khalid
,
Syed Muqsit Shaheed
,
Jalil Abbas
,
M. Zia-Ul-Haq
Journal of Computer and Communications
Vol.3 No.12
,December 9, 2015
DOI:
10.4236/jcc.2015.312005
5,053
Downloads
6,874
Views
Citations
Implementation of an Efficient Light Weight Security Algorithm for Energy-Constrained Wireless Sensor Nodes
(Articles)
A. Saravanaselvan
,
B. Paramasivan
Circuits and Systems
Vol.7 No.9
,July 18, 2016
DOI:
10.4236/cs.2016.79194
1,505
Downloads
2,633
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
247
Downloads
1,329
Views
Citations
Strengthening the Security of Supervised Networks by Automating Hardening Mechanisms
(Articles)
Patrick Dany Bavoua Kenfack
,
Alphonse Binele Abana
,
Emmanuel Tonye
,
Genevieve Elvira Ndjana Leka
Journal of Computer and Communications
Vol.11 No.5
,May 26, 2023
DOI:
10.4236/jcc.2023.115009
71
Downloads
443
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
,September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,490
Downloads
5,238
Views
Citations
Research on the Anomaly Detection Method in Intelligent Patrol Based on Big Data Analysis
(Articles)
Xiaoqing Deng
Journal of Computer and Communications
Vol.7 No.8
,August 21, 2019
DOI:
10.4236/jcc.2019.78001
627
Downloads
1,636
Views
Citations
Misbehavior Detection Method by Time Series Change of Vehicle Position in Vehicle-to-Everything Communication
(Articles)
Toshiki Okamura
,
Kenya Sato
Journal of Transportation Technologies
Vol.11 No.2
,April 29, 2021
DOI:
10.4236/jtts.2021.112018
412
Downloads
1,413
Views
Citations
READA: Redundancy Elimination for Accurate Data Aggregation in Wireless Sensor Networks
(Articles)
Kavi Khedo
,
Rubeena Doomun
,
Sonum Aucharuz
Wireless Sensor Network
Vol.2 No.4
,April 23, 2010
DOI:
10.4236/wsn.2010.24041
6,340
Downloads
13,303
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
4,972
Downloads
9,735
Views
Citations
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior
(Articles)
Faisal Alghayadh
,
Debatosh Debnath
Advances in Internet of Things
Vol.11 No.1
,January 28, 2021
DOI:
10.4236/ait.2021.111002
1,294
Downloads
6,067
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
129
Downloads
659
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,746
Downloads
11,258
Views
Citations
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
,November 12, 2015
DOI:
10.4236/iim.2015.76023
5,234
Downloads
6,233
Views
Citations
This article belongs to the Special Issue on
Cyber Security
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,443
Downloads
2,657
Views
Citations
Combining Artificial Immune System and Clustering Analysis: A Stock Market Anomaly Detection Model
(Articles)
Liam Close
,
Rasha Kashef
Journal of Intelligent Learning Systems and Applications
Vol.12 No.4
,October 14, 2020
DOI:
10.4236/jilsa.2020.124005
1,936
Downloads
4,605
Views
Citations
Multidimensional Design Paradigms for Data Warehouses: A Systematic Mapping Study
(Articles)
Ania Cravero
,
Samuel Sepúlveda
Journal of Software Engineering and Applications
Vol.7 No.1
,January 17, 2014
DOI:
10.4236/jsea.2014.71006
5,057
Downloads
8,314
Views
Citations
A Lightweight Data Aggregation Protocol in Wireless Sensor Networks for the Protection of Ancient Sites
(Articles)
Xiaojiang Chen
,
Dingyi Fang
,
Xueqing Huang
,
Baoying Liu
,
Xiaoqiong Gong
,
Wenbo Wang
,
Alessio Perrone
Journal of Sensor Technology
Vol.1 No.4
,December 5, 2011
DOI:
10.4236/jst.2011.14013
4,115
Downloads
8,598
Views
Citations
A Tree Based Data Aggregation Scheme for Wireless Sensor Networks Using GA
(Articles)
Ali Norouzi
,
Faezeh Sadat Babamir
,
Zeynep Orman
Wireless Sensor Network
Vol.4 No.8
,August 29, 2012
DOI:
10.4236/wsn.2012.48028
5,418
Downloads
10,112
Views
Citations
A Security Architecture for SCADA Systems
(Articles)
Arun Velagapalli
,
Mahalingam Ramkumar
Journal of Information Security
Vol.9 No.1
,January 23, 2018
DOI:
10.4236/jis.2018.91009
1,332
Downloads
3,810
Views
Citations
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
84
Downloads
533
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top