Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Digital Evidence for Database Tamper Detection
(Articles)
Shweta Tripathi
,
Bandu Baburao Meshram
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32014
7,811
Downloads
13,415
Views
Citations
The Pale Shades of Emotion: A Signal Detection Theory Analysis of the Emotional Stroop Task
(Articles)
Boaz M. Ben-David
,
Eran Chajut
,
Daniel Algom
Psychology
Vol.3 No.7
,June 18, 2012
DOI:
10.4236/psych.2012.37079
5,856
Downloads
11,198
Views
Citations
Improving Resilience Models of Health Systems before COVID-19 Pandemic in Côte d’Ivoire
(Articles)
Gérard B. N’Guessan
,
Ida Brou Assie
,
Jean S. Inkpé Haudie
Journal of Computer and Communications
Vol.11 No.2
,February 16, 2023
DOI:
10.4236/jcc.2023.112001
67
Downloads
426
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,797
Downloads
14,106
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Joint Multi-User Detection with Weighting Factors for Unsourced Multiple Access
(Articles)
Yu Liu
,
Kai Niu
,
Yuanjie Li
Journal of Computer and Communications
Vol.11 No.9
,September 28, 2023
DOI:
10.4236/jcc.2023.119007
71
Downloads
237
Views
Citations
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
217
Downloads
1,720
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,587
Downloads
14,510
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,222
Downloads
11,302
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,846
Downloads
8,969
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,895
Downloads
9,078
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,572
Downloads
8,258
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
8,802
Downloads
14,068
Views
Citations
An Integrated Intrusion Detection System by Combining SVM with AdaBoost
(Articles)
Yu Ren
Journal of Software Engineering and Applications
Vol.7 No.12
,November 21, 2014
DOI:
10.4236/jsea.2014.712090
4,485
Downloads
5,400
Views
Citations
High Speed and Low Power Architecture for Network Intrusion Detection System
(Articles)
Palanisamy Brindha
,
Athappan Senthilkumar
Circuits and Systems
Vol.7 No.8
,June 8, 2016
DOI:
10.4236/cs.2016.78115
1,474
Downloads
2,266
Views
Citations
A User Selection Method in Advertising System
(Articles)
Shiyi XIONG
,
Zhiqing LIN
,
Bo XIAO
Int'l J. of Communications, Network and System Sciences
Vol.3 No.1
,January 20, 2010
DOI:
10.4236/ijcns.2010.31007
4,977
Downloads
8,823
Views
Citations
From Deterministic to Random Models: An Analysis of the New Spanish Overtaking Traffic Law
(Articles)
Enrique Castillo
,
José Duato
,
Javier Girón
Open Journal of Statistics
Vol.13 No.1
,February 28, 2023
DOI:
10.4236/ojs.2023.131006
121
Downloads
429
Views
Citations
Comparing the Area of Data Mining Algorithms in Network Intrusion Detection
(Articles)
Yasamin Alagrash
,
Azhar Drebee
,
Nedda Zirjawi
Journal of Information Security
Vol.11 No.1
,December 10, 2019
DOI:
10.4236/jis.2020.111001
963
Downloads
2,038
Views
Citations
A Novel Attack Graph Posterior Inference Model Based on Bayesian Network
(Articles)
Shaojun Zhang
,
Shanshan Song
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21002
6,642
Downloads
12,133
Views
Citations
Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge
(Articles)
Peter Darcy
,
Steven Tucker
,
Bela Stantic
Advances in Internet of Things
Vol.3 No.2
,April 30, 2013
DOI:
10.4236/ait.2013.32004
3,952
Downloads
7,428
Views
Citations
Anomalous Network Packet Detection Using Data Stream Mining
(Articles)
Zachary Miller
,
William Deitrick
,
Wei Hu
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24016
6,772
Downloads
13,993
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top