Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48064
6,117
Downloads
11,210
Views
Citations
A Two Step Secure Spectrum Sensing Algorithm Using Fuzzy Logic for Cognitive Radio Networks
(Articles)
Ehsan Moeen Taghavi
,
Bahman Abolhassani
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48062
5,614
Downloads
10,493
Views
Citations
Anomalous Network Packet Detection Using Data Stream Mining
(Articles)
Zachary Miller
,
William Deitrick
,
Wei Hu
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24016
6,897
Downloads
14,300
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
5,117
Downloads
9,865
Views
Citations
Improved Data Discrimination in Wireless Sensor Networks
(Articles)
B. A. Sabarish
,
S. Shanmugapriya
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44016
5,062
Downloads
8,850
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,435
Downloads
8,691
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,914
Downloads
14,415
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Efficient Performance Analysis of Spectrum Sensing for Cascaded Multihop Network over Nagakami-m Fading Channels
(Articles)
Deepti Kakkar
,
Arun Khosla
,
Moin Uddin
Engineering
Vol.6 No.2
,February 10, 2014
DOI:
10.4236/eng.2014.62010
4,488
Downloads
6,324
Views
Citations
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications
(Review)
Arif Sari
Journal of Information Security
Vol.6 No.2
,April 23, 2015
DOI:
10.4236/jis.2015.62015
10,909
Downloads
14,839
Views
Citations
An Application of Canny Edge Detection Algorithm to Rail Thermal Image Fault Detection
(Articles)
Libo Cai
,
Yu Ma
,
Tangming Yuan
,
Haifeng Wang
,
Tianhua Xu
Journal of Computer and Communications
Vol.3 No.11
,November 19, 2015
DOI:
10.4236/jcc.2015.311004
3,095
Downloads
4,670
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,554
Downloads
5,317
Views
Citations
An Improved Moving Object Detection Algorithm Based on Gaussian Mixture Models
(Articles)
Xuegang Hu
,
Jiamin Zheng
Open Journal of Applied Sciences
Vol.6 No.7
,July 27, 2016
DOI:
10.4236/ojapps.2016.67045
2,450
Downloads
4,324
Views
Citations
Optimization of DNA Staining Technology for Development of Autonomous Microbe Sensor for Injection Seawater Systems
(Articles)
Mohammed A. Al-Moniee
,
Xiangyang Zhu
,
Lone Tang
,
Susanne Juhler
,
Fuad I. Nuwaiser
,
Peter F. Sanders
,
Fahad N. Al-Abeedi
Journal of Sensor Technology
Vol.6 No.3
,August 11, 2016
DOI:
10.4236/jst.2016.63003
2,360
Downloads
3,376
Views
Citations
Code Clone Detection Method Based on the Combination of Tree-Based and Token-Based Methods
(Articles)
Ryota Ami
,
Hirohide Haga
Journal of Software Engineering and Applications
Vol.10 No.13
,December 28, 2017
DOI:
10.4236/jsea.2017.1013051
1,392
Downloads
3,221
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,720
Downloads
3,923
Views
Citations
A Review of Researches on Deep Learning in Remote Sensing Application
(Articles)
Ming Zhu
,
Yongning He
,
Qingyu He
International Journal of Geosciences
Vol.10 No.1
,January 10, 2019
DOI:
10.4236/ijg.2019.101001
2,656
Downloads
7,416
Views
Citations
In-Vehicle Stereo Vision Systems with Improved Ant Colony Optimization Based Lane Detection: A Solution to Accidents Involving Large Goods Vehicles Due to Blind Spots
(Articles)
Ibrahim Adamu Umar
,
Shengbo Hu
,
Hongqiu Luo
Open Journal of Applied Sciences
Vol.12 No.3
,March 22, 2022
DOI:
10.4236/ojapps.2022.123025
217
Downloads
1,046
Views
Citations
Fast Object Extraction and Euler Number on Block Represented Images
(Articles)
Iraklis M. Spiliotis
,
Alexandros S. Peppas
,
Nikolaos D. Karampasis
,
Yiannis S. Boutalis
Journal of Data Analysis and Information Processing
Vol.10 No.2
,March 31, 2022
DOI:
10.4236/jdaip.2022.102006
246
Downloads
2,075
Views
Citations
Application of Dual-Energy X-Ray Image Detection of Dangerous Goods Based on YOLOv7
(Articles)
Baosheng Liu
,
Fei Wang
,
Ming Gao
,
Lei Zhao
Journal of Computer and Communications
Vol.11 No.7
,July 31, 2023
DOI:
10.4236/jcc.2023.117013
163
Downloads
749
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
110
Downloads
510
Views
Citations
<
...
19
20
21
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top