Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Improved Data Discrimination in Wireless Sensor Networks
(Articles)
B. A. Sabarish
,
S. Shanmugapriya
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44016
5,101
Downloads
8,997
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,483
Downloads
8,896
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
11,050
Downloads
15,351
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,606
Downloads
5,545
Views
Citations
Securing Consumer Banking Websites Using Machine Learning: A Mathematical and Practical Approach (Working 2024)
(Articles)
Fahad Al-Zahrani
Journal of Computer and Communications
Vol.13 No.3
,March 20, 2025
DOI:
10.4236/jcc.2025.133002
66
Downloads
368
Views
Citations
Correction of Inertial Navigation System’s Errors by the Help of Video-Based Navigator Based on Digital Terrarium Map
(Articles)
Oleg Yurjevich Kupervasser
,
Alexander Alexandrovich Rubinstein
Positioning
Vol.4 No.1
,February 28, 2013
DOI:
10.4236/pos.2013.41010
5,206
Downloads
8,649
Views
Citations
Video
-
Based Instruction: Effects on EFL Learners’ Spoken Learning
(Articles)
Cuifeng Ouyang
Creative Education
Vol.15 No.12
,December 25, 2024
DOI:
10.4236/ce.2024.1512159
114
Downloads
762
Views
Citations
An Ensemble Machine Learning Based Algorithm to Enhance Detection of Zero-Day Attacks: A Comparative Review
(Articles)
Dominic John Kavoi
,
Charles Jumaa Katila
,
Richard Otieno Omollo
Journal of Information Security
Vol.16 No.3
,July 23, 2025
DOI:
10.4236/jis.2025.163021
88
Downloads
420
Views
Citations
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
(Articles)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31003
5,390
Downloads
9,728
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
5,016
Downloads
8,967
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
3,059
Downloads
6,034
Views
Citations
Anomaly Detection of Store Cash Register Data Based on Improved LOF Algorithm
(Articles)
Ke Long
,
Yuhang Wu
,
Yufeng Gui
Applied Mathematics
Vol.9 No.6
,June 29, 2018
DOI:
10.4236/am.2018.96049
1,251
Downloads
2,659
Views
Citations
Survey and Proposal of an Adaptive Anomaly Detection Algorithm for Periodic Data Streams
(Articles)
Zirije Hasani
,
Samedin Krrabaj
Journal of Computer and Communications
Vol.7 No.8
,August 29, 2019
DOI:
10.4236/jcc.2019.78004
1,223
Downloads
3,533
Views
Citations
Financial Anomalies and Creditworthiness: A Python-Driven Machine Learning Approach Using Mahalanobis Distance for ISE-Listed Companies in the Production and Manufacturing Sector
(Articles)
Hasan Demirhan
Journal of Financial Risk Management
Vol.13 No.1
,January 25, 2024
DOI:
10.4236/jfrm.2024.131001
409
Downloads
2,044
Views
Citations
Machine Learning Models for Heterogenous Network Security Anomaly Detection
(Articles)
Mercy Diligence Ogah
,
Joe Essien
,
Martin Ogharandukun
,
Monday Abdullahi
Journal of Computer and Communications
Vol.12 No.6
,June 25, 2024
DOI:
10.4236/jcc.2024.126004
183
Downloads
1,012
Views
Citations
Research on the Application of Machine Learning in Financial Anomaly Detection
(Articles)
Qiye Wang
iBusiness
Vol.16 No.4
,November 28, 2024
DOI:
10.4236/ib.2024.164012
126
Downloads
929
Views
Citations
A Wind Turbine Anomaly Detection Method Based on Improved Auxiliary Classifier Generative Adversarial Networks
(Articles)
Xiangyan Meng
,
Jiyu Zeng
,
Zuquan Zhang
,
Peng Luo
,
Lin Yang
Open Journal of Applied Sciences
Vol.14 No.12
,December 31, 2024
DOI:
10.4236/ojapps.2024.1412242
52
Downloads
365
Views
Citations
Time Series Anomaly Detection Based on the Combination of Trend Feature Discrimination and Expert Memory
(Articles)
Yuan Jiang
,
Xinchen Xu
,
Huacheng Cui
,
Shengyan Song
,
Zuixing Lin
,
Zhe Li
,
He Lin
,
Xuewen Ding
Journal of Computer and Communications
Vol.13 No.10
,October 15, 2025
DOI:
10.4236/jcc.2025.1310004
14
Downloads
107
Views
Citations
Graph Neural Networks for Anomaly Detection in Cloud Infrastructure
(Articles)
Adithya Jakkaraju
Journal of Computer and Communications
Vol.13 No.10
,October 22, 2025
DOI:
10.4236/jcc.2025.1310006
29
Downloads
197
Views
Citations
The Effect of Conducting Introduction Activities with Native Language and Video Learning on Academic Success in Teaching
(Articles)
Mehmet Ülker
,
Hüseyin Güngör
,
Yeliz Çakıroğlu
Creative Education
Vol.12 No.5
,May 31, 2021
DOI:
10.4236/ce.2021.125087
404
Downloads
1,399
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top