Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
The Effect of HRIS Adoption on Vodafone Egypt Firm’s Performance
(Articles)
Dalia Mohamed ElNakib
,
Mohamed A. Ragheb
,
Rasha Abd ElAziz Youssef
,
Abdel Nasser Ghanem
Journal of Human Resource and Sustainability Studies
Vol.9 No.2
,April 28, 2021
DOI:
10.4236/jhrss.2021.92012
1,635
Downloads
3,713
Views
Citations
This article belongs to the Special Issue on
Performance and Reward Management
A High-level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Wireless Sensor Network
Vol.3 No.7
,July 28, 2011
DOI:
10.4236/wsn.2011.37026
9,525
Downloads
20,415
Views
Citations
Designing an Agent-Based Intrusion Detection System for Heterogeneous Wireless Sensor Networks: Robust, Fault Tolerant and Dynamic Reconfigurable
(Articles)
Hossein Jadidoleslamy
Int'l J. of Communications, Network and System Sciences
Vol.4 No.8
,August 19, 2011
DOI:
10.4236/ijcns.2011.48064
6,134
Downloads
11,258
Views
Citations
Anomalous Network Packet Detection Using Data Stream Mining
(Articles)
Zachary Miller
,
William Deitrick
,
Wei Hu
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24016
6,914
Downloads
14,359
Views
Citations
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
5,138
Downloads
9,940
Views
Citations
Data Stream Subspace Clustering for Anomalous Network Packet Detection
(Articles)
Zachary Miller
,
Wei Hu
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33027
5,446
Downloads
8,750
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,572
Downloads
5,385
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,730
Downloads
3,984
Views
Citations
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
(Articles)
Emmanuel S. Kolawole
,
Penrose S. Cofie
,
John H. Fuller
,
Cajetan M. Akujuobi
,
Emmanuel A. Dada
,
Justin F. Foreman
,
Pamela H. Obiomon
Communications and Network
Vol.16 No.3
,August 30, 2024
DOI:
10.4236/cn.2024.163006
123
Downloads
567
Views
Citations
Distributed and Cooperative Anomaly Detection Scheme for Mobile Ad Hoc Networks
(Articles)
Hisham Mustafa
,
Yan Xiong
,
Khalid Elaalim
Journal of Computer and Communications
Vol.2 No.3
,February 14, 2014
DOI:
10.4236/jcc.2014.23001
3,011
Downloads
5,907
Views
Citations
Cyber-Security of Smart Grids: Attacks, Detection, Countermeasure Techniques, and Future Directions
(Articles)
Tala Talaei Khoei
,
Hadjar Ould Slimane
,
Naima Kaabouch
Communications and Network
Vol.14 No.4
,November 24, 2022
DOI:
10.4236/cn.2022.144009
1,071
Downloads
8,332
Views
Citations
PhishGuard: Integrating Fine-Tuned Large Language Models (LLMs) into Password Management
(Articles)
Smith Patel
,
Vijay K. Madisetti
Journal of Information Security
Vol.15 No.4
,October 10, 2024
DOI:
10.4236/jis.2024.154027
75
Downloads
507
Views
Citations
Role of Software Reliability Models in Performance Improvement and Management
(Articles)
Padmanabha Aital
,
P. Sashikala
Journal of Software Engineering and Applications
Vol.5 No.9
,September 14, 2012
DOI:
10.4236/jsea.2012.59086
5,193
Downloads
8,519
Views
Citations
Multi-Branch Fractional Multi-Bit Differential Detection of Continuous Phase Modulation with Decision Feedback
(Articles)
Jinhua Sun
,
Xiaojun Wu
Communications and Network
Vol.3 No.1
,February 25, 2011
DOI:
10.4236/cn.2011.31004
5,311
Downloads
9,180
Views
Citations
Influences on the Marking of Examinations
(Articles)
Christina Bermeitinger
,
Benjamin Unger
Psychology
Vol.5 No.2
,February 26, 2014
DOI:
10.4236/psych.2014.52014
6,113
Downloads
8,183
Views
Citations
Erratum to “Influences on the Marking of Examinations” [Psychology 5 (2014) 91-98]
(Articles)
Christina Bermeitinger
,
Benjamin Unger
Psychology
Vol.13 No.1
,January 19, 2022
DOI:
10.4236/psych.2022.131004
88
Downloads
539
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,323
Downloads
9,587
Views
Citations
Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks
(Articles)
Hua Wei
,
Hao Sun
Int'l J. of Communications, Network and System Sciences
Vol.3 No.7
,July 27, 2010
DOI:
10.4236/ijcns.2010.37080
7,823
Downloads
12,799
Views
Citations
Effect of Network Traffic on IPS Performance
(Articles)
Shahriar Mohammadi
,
Vahid Allahvakil
,
Mojtaba Khaghani
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32019
6,646
Downloads
11,015
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,941
Downloads
8,774
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
<
...
2
3
4
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top