Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
217
Downloads
1,718
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,587
Downloads
14,510
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,845
Downloads
8,967
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,895
Downloads
9,078
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,572
Downloads
8,258
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
8,801
Downloads
14,066
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,485
Downloads
5,400
Views
Citations
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
,June 8, 2016
DOI:
10.4236/cs.2016.78115
1,474
Downloads
2,266
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
4,985
Downloads
9,556
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,639
Downloads
3,557
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
137
Downloads
614
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
151
Downloads
609
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A WebGIS Solution for Estimation Landuse Affected by Salinity Intrusion: Case Study in Ben Tre Province, Vietnam
(Articles)
Tran Thai Binh
,
Ho Lam Truong
,
Do Thanh Long
Journal of Geographic Information System
Vol.12 No.3
,June 18, 2020
DOI:
10.4236/jgis.2020.123012
515
Downloads
1,719
Views
Citations
Fault Tolerance Limits and Input Stimulus Selection Using an Implemented FPGA-Based Testing System
(Articles)
Papakostas K. Dimitrios
,
Pouros P. Sotirios
,
Vassios D. Vassilios
Journal of Computer and Communications
Vol.2 No.13
,November 19, 2014
DOI:
10.4236/jcc.2014.213003
2,704
Downloads
3,271
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,203
Downloads
9,278
Views
Citations
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,652
Downloads
9,362
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
730
Downloads
10,739
Views
Citations
A Real-Time Measurement Algorithm for Available Bandwidth
(Articles)
Yi YIN
,
Weidong WU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.8
,November 17, 2009
DOI:
10.4236/ijcns.2009.28086
6,134
Downloads
10,341
Views
Citations
A Customized Authentication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs
(Articles)
Mubashir Hussain
,
Hui Guo
,
Sri Parameswaran
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61015
770
Downloads
1,534
Views
Citations
A Sphere Detection Based Adaptive MIMO Detection Algorithm for LTE-A System
(Articles)
Xuanli Wu
,
Lukuan Sun
,
Mingxin Luo
Communications and Network
Vol.5 No.2B
,July 10, 2013
DOI:
10.4236/cn.2013.52B005
3,104
Downloads
4,728
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top