Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,561
Downloads
8,235
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,746
Downloads
10,891
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
8,749
Downloads
13,952
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,478
Downloads
5,380
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,602
Downloads
7,191
Views
Citations
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
,June 8, 2016
DOI:
10.4236/cs.2016.78115
1,467
Downloads
2,248
Views
Citations
Evaluating Project Management Software Packages Using a Scoring Model—A Comparison between MS Project and Primavera
(Articles)
Hani Gharaibeh
Journal of Software Engineering and Applications
Vol.7 No.7
,June 5, 2014
DOI:
10.4236/jsea.2014.77050
6,925
Downloads
9,643
Views
Citations
Developing a Scoring Model to Evaluate Project Management Software Packages Based on ISO/IEC Software Evaluation Criterion
(Articles)
Hani M. Gharaibeh
Journal of Software Engineering and Applications
Vol.7 No.1
,January 17, 2014
DOI:
10.4236/jsea.2014.71004
8,753
Downloads
11,801
Views
Citations
Software Architecture and Methodology as a Tool for Efficient Software Engineering Process: A Critical Appraisal
(Articles)
Achimugu Philip
,
Babajide Afolabi
,
Oluwaranti Adeniran
,
Gambo Ishaya
,
Oluwagbemi Oluwatolani
Journal of Software Engineering and Applications
Vol.3 No.10
,November 19, 2010
DOI:
10.4236/jsea.2010.310110
6,496
Downloads
11,990
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
4,976
Downloads
9,527
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,455
Downloads
4,950
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,627
Downloads
3,514
Views
Citations
A Study on Exhibition Evaluation System from the Perspective of Exhibitor
(Articles)
Simin Huang
,
Yingtao Yang
,
Yanan Zhou
,
Peng Ju
Journal of Service Science and Management
Vol.13 No.2
,April 29, 2020
DOI:
10.4236/jssm.2020.132028
934
Downloads
1,978
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
118
Downloads
473
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Analysis of Influence of Price to Customer Satisfaction Based on the Prediction Models
(Articles)
Kazuhiro Esaki
Intelligent Information Management
Vol.5 No.3
,May 24, 2013
DOI:
10.4236/iim.2013.53010
7,075
Downloads
14,820
Views
Citations
A WebGIS Solution for Estimation Landuse Affected by Salinity Intrusion: Case Study in Ben Tre Province, Vietnam
(Articles)
Tran Thai Binh
,
Ho Lam Truong
,
Do Thanh Long
Journal of Geographic Information System
Vol.12 No.3
,June 18, 2020
DOI:
10.4236/jgis.2020.123012
513
Downloads
1,690
Views
Citations
Fault Tolerance Limits and Input Stimulus Selection Using an Implemented FPGA-Based Testing System
(Articles)
Papakostas K. Dimitrios
,
Pouros P. Sotirios
,
Vassios D. Vassilios
Journal of Computer and Communications
Vol.2 No.13
,November 19, 2014
DOI:
10.4236/jcc.2014.213003
2,696
Downloads
3,255
Views
Citations
Intermediate Common Model—The Solution to Separate Concerns and Responsiveness in Dynamic Context-Aware System
(Articles)
Gaëtan Rey
,
The Can Do
,
Jean-Yves Tigli
,
Stéphane Lavirotte
,
Nhan Le Thanh
Journal of Computer and Communications
Vol.5 No.4
,March 14, 2017
DOI:
10.4236/jcc.2017.54004
1,416
Downloads
2,389
Views
Citations
This article belongs to the Special Issue on
Ubiquitous Computing and Applications
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
(Articles)
Faisal Nabi
,
Jianming Yong
,
Xiaohui Tao
,
Muhammad Saqib Malhi
,
Umar Mahmood
,
Usman Iqbal
Journal of Information Security
Vol.11 No.4
,October 27, 2020
DOI:
10.4236/jis.2020.114018
501
Downloads
1,723
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,196
Downloads
9,249
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top