Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
282
Downloads
2,112
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
33
Downloads
159
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,723
Downloads
14,816
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,320
Downloads
11,588
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,971
Downloads
9,232
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,667
Downloads
8,549
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,886
Downloads
11,208
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
9,451
Downloads
15,375
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,546
Downloads
5,644
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,790
Downloads
7,857
Views
Citations
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment
(Articles)
Anyi Liu
,
Jim X. Chen
,
Harry Wechsler
Intelligent Information Management
Vol.7 No.6
,November 12, 2015
DOI:
10.4236/iim.2015.76023
5,305
Downloads
6,347
Views
Citations
This article belongs to the Special Issue on
Cyber Security
Trusted-CDS Based Intrusion Detection System in Wireless Sensor Network (TC-IDS)
(Articles)
Amin Mohajer
,
Mohammad Hasan Hajimobini
,
Abbas Mirzaei
,
Ehsan Noori
Open Access Library Journal
Vol.1 No.7
,October 22, 2014
DOI:
10.4236/oalib.1100848
1,479
Downloads
2,855
Views
Citations
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
,June 8, 2016
DOI:
10.4236/cs.2016.78115
1,537
Downloads
2,432
Views
Citations
Deep Learning-Based Two-Step Approach for Intrusion Detection in Networks
(Articles)
Kamagaté Beman Hamidja
,
Kanga Koffi
,
Kouassi Adless
,
Olivier Asseu
,
Souleymane Oumtanaga
International Journal of Internet and Distributed Systems
Vol.6 No.2
,November 22, 2024
DOI:
10.4236/ijids.2024.62002
89
Downloads
494
Views
Citations
An Energy-Efficient Cross-Layer Approach for Wireless Sensor Networks Security
(Articles)
Namwinwelbere Dabiré
,
Abdoul-Hadi Konfé
,
Pegdwindé Justin Kouraogo
Journal of Sensor Technology
Vol.15 No.1
,January 26, 2025
DOI:
10.4236/jst.2025.151002
58
Downloads
249
Views
Citations
Use of Machine Learning and Deep Learning in Intrusion Detection for IoT
(Articles)
Muhannad Almohaimeed
,
Rasha Alyoubi
,
Afnan Aljohani
,
Mashael Alhaidari
,
Faisal Albalwy
,
Fahad Ghabban
,
Ibrahim Alfadli
,
Omair Ameerbakhsh
Advances in Internet of Things
Vol.15 No.2
,April 1, 2025
DOI:
10.4236/ait.2025.152002
82
Downloads
414
Views
Citations
Enhancing Microsoft CyberBattleSim for Enterprise Cybersecurity Simulations
(Articles)
Jackson Norris
,
Vijay K. Madisetti
Journal of Information Security
Vol.16 No.2
,April 8, 2025
DOI:
10.4236/jis.2025.162014
34
Downloads
297
Views
Citations
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
(Articles)
Yasamin Alagrash
,
Azhar Drebee
,
Nedda Zirjawi
Journal of Information Security
Vol.11 No.1
,December 10, 2019
DOI:
10.4236/jis.2020.111001
1,092
Downloads
2,402
Views
Citations
Reliability Analysis of a Redundant Cascade System by Using Markovian Approach
(Articles)
Nalabolu Swathi
,
Tallapureddy Sumathi Uma Maheswari
Journal of Applied Mathematics and Physics
Vol.3 No.7
,July 29, 2015
DOI:
10.4236/jamp.2015.37111
3,208
Downloads
4,048
Views
Citations
The Effect of HRIS Adoption on Vodafone Egypt Firm’s Performance
(Articles)
Dalia Mohamed ElNakib
,
Mohamed A. Ragheb
,
Rasha Abd ElAziz Youssef
,
Abdel Nasser Ghanem
Journal of Human Resource and Sustainability Studies
Vol.9 No.2
,April 28, 2021
DOI:
10.4236/jhrss.2021.92012
1,596
Downloads
3,498
Views
Citations
This article belongs to the Special Issue on
Performance and Reward Management
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top