Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journals
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
FAQ
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462
(WhatsApp)
1655362766
SCIRP WeChat
Publication Date:
📅
--📅
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents
(Articles)
Thomas Djotio Ndié
,
Claude Tangha
,
Guy Bertrand Fopak
Journal of Information Security
Vol.3 No.4
, October 31, 2012
DOI:
10.4236/jis.2012.34035
4,740
Downloads
7,754
Views
Citations
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
, December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,941
Downloads
5,863
Views
Citations
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
(Articles)
Agbotiname L. Imoize
,
Taiwo Oyedare
,
Michael E. Otuokere
,
Sachin Shetty
Communications and Network
Vol.10 No.4
, November 23, 2018
DOI:
10.4236/cn.2018.104017
2,164
Downloads
4,801
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
International Journal of Communications, Network and System Sciences
Vol.2 No.6
, September 22, 2009
DOI:
10.4236/ijcns.2009.26063
6,040
Downloads
10,893
Views
Citations
Ground Water Vis-A-Vis Sea Water Intrusion Analysis for a Part of Limestone Tract of Gujarat Coast, India
(Articles)
Abhay K. Soni
,
Paras R. Pujari
Journal of Water Resource and Protection
Vol.2 No.5
, May 27, 2010
DOI:
10.4236/jwarp.2010.25053
7,530
Downloads
14,776
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
International Journal of Communications, Network and System Sciences
Vol.3 No.5
, May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,624
Downloads
8,741
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
International Journal of Communications, Network and System Sciences
Vol.4 No.5
, May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,613
Downloads
8,836
Views
Citations
Metallurgical Use of Heat Altered Coal: A Case Study
(Articles)
Debjani Nag
,
A.K. Singh
,
P.K. Banerjee
Journal of Minerals and Materials Characterization and Engineering
Vol.8 No.7
, July 20, 2009
DOI:
10.4236/jmmce.2009.87047
7,080
Downloads
10,008
Views
Citations
Fluid Mechanics of Intrusives
(Articles)
Jónas Elíasson
International Journal of Geosciences
Vol.4 No.10A
, December 30, 2013
DOI:
10.4236/ijg.2013.410A002
2,897
Downloads
5,152
Views
Citations
This article belongs to the Special Issue on
Advances in Mathematical and Computational Geosciences
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
, March 12, 2014
DOI:
10.4236/jis.2014.52004
4,925
Downloads
6,992
Views
Citations
Petrology, Geochemistry and Tectonomagmatic Setting of Neshveh Intrusion (NW Saveh)
(Articles)
Reza Keshavarzi
,
Dariush Esmaili
,
Mehdi Rezaei Kahkhaei
,
Mir Ali Asghar Mokhtari
,
Reza Jabari
Open Journal of Geology
Vol.4 No.5
, May 2, 2014
DOI:
10.4236/ojg.2014.45013
6,321
Downloads
9,949
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
, September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,789
Downloads
5,963
Views
Citations
Assessment of Saltwater Intrusion and Discharges to a Wetland with a 3D Transient Variable Density Flow Model: The Coastal Plane Oropesa-Torreblanca Aquifer, Spain
(Articles)
Ignacio Sanz-Garrido
,
José E. Capilla
Journal of Water Resource and Protection
Vol.7 No.9
, July 14, 2015
DOI:
10.4236/jwarp.2015.79062
4,138
Downloads
5,693
Views
Citations
Numerical Simulation and Prediction of Groundwater Flow in a Coastal Aquifer of Southern India
(Articles)
S. Sathish
,
L. Elango
Journal of Water Resource and Protection
Vol.7 No.17
, December 25, 2015
DOI:
10.4236/jwarp.2015.717122
5,382
Downloads
7,318
Views
Citations
Assessing the Seawater Intrusion Due to Beach Wells in the Desalination Plant
(Articles)
Yunes Mogheir
Journal of Geoscience and Environment Protection
Vol.4 No.12
, December 8, 2016
DOI:
10.4236/gep.2016.412003
1,950
Downloads
3,320
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
, January 28, 2019
DOI:
10.4236/cn.2019.111002
1,020
Downloads
2,269
Views
Citations
Evaluation of Sea-Water Intrusion in Coastal Aquifers Using both Numerical Methods and Causal Research: A Case Study of Mombasa, Kenya
(Articles)
Dorcas Mutheu Musingi
,
Michael Mbindyo Munywoki
,
Benjamin Musyimi Musingi
Engineering
Vol.13 No.7
, July 16, 2021
DOI:
10.4236/eng.2021.137028
601
Downloads
2,816
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
, January 31, 2011
DOI:
10.4236/jis.2011.21003
10,533
Downloads
24,308
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
, November 1, 2012
DOI:
10.4236/ijis.2012.224016
8,094
Downloads
15,006
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
, April 19, 2022
DOI:
10.4236/jsea.2022.154006
400
Downloads
2,758
Views
Citations
First
<
1
2
3
...
>
Last
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
SCIRP Newsletter
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
News
About SCIRP
Ethics
Editorial Policies
For Authors
Peer-Review Issues
Publication Fees
Special Issues
Service
Manuscript Tracking System
Order Print Copies
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2026 Scientific Research Publishing Inc. All Rights Reserved.
Top