Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Tanimoto Based Similarity Measure for Intrusion Detection System
(Articles)
Alok Sharma
,
Sunil Pranit Lal
Journal of Information Security
Vol.2 No.4
,October 24, 2011
DOI:
10.4236/jis.2011.24019
4,985
Downloads
9,557
Views
Citations
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers
(Articles)
Sai Kiran Mukkavilli
,
Sachin Shetty
,
Liang Hong
Journal of Information Security
Vol.7 No.3
,April 14, 2016
DOI:
10.4236/jis.2016.73013
3,459
Downloads
4,969
Views
Citations
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,639
Downloads
3,561
Views
Citations
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152008
151
Downloads
613
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
A WebGIS Solution for Estimation Landuse Affected by Salinity Intrusion: Case Study in Ben Tre Province, Vietnam
(Articles)
Tran Thai Binh
,
Ho Lam Truong
,
Do Thanh Long
Journal of Geographic Information System
Vol.12 No.3
,June 18, 2020
DOI:
10.4236/jgis.2020.123012
515
Downloads
1,721
Views
Citations
Fault Tolerance Limits and Input Stimulus Selection Using an Implemented FPGA-Based Testing System
(Articles)
Papakostas K. Dimitrios
,
Pouros P. Sotirios
,
Vassios D. Vassilios
Journal of Computer and Communications
Vol.2 No.13
,November 19, 2014
DOI:
10.4236/jcc.2014.213003
2,704
Downloads
3,272
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,203
Downloads
9,280
Views
Citations
Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse
(Articles)
Bogdan Denny Czejdo
,
Erik M. Ferragut
,
John R. Goodall
,
Jason Laska
Int'l J. of Communications, Network and System Sciences
Vol.5 No.9A
,September 18, 2012
DOI:
10.4236/ijcns.2012.529069
4,784
Downloads
8,410
Views
Citations
This article belongs to the Special Issue on
Models and Algorithms for Applications
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,653
Downloads
9,364
Views
Citations
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology
(Articles)
Emad Felemban
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65028
12,557
Downloads
21,572
Views
Citations
Comparison of Feature Reduction Techniques for the Binominal Classification of Network Traffic
(Articles)
Adel Ammar
Journal of Data Analysis and Information Processing
Vol.3 No.2
,May 8, 2015
DOI:
10.4236/jdaip.2015.32002
4,873
Downloads
5,848
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
730
Downloads
10,746
Views
Citations
Systematic Review of Graphical Visual Methods in Honeypot Attack Data Analysis
(Articles)
Gbenga Ikuomenisan
,
Yasser Morgan
Journal of Information Security
Vol.13 No.4
,August 23, 2022
DOI:
10.4236/jis.2022.134012
251
Downloads
1,232
Views
Citations
A Sphere Detection Based Adaptive MIMO Detection Algorithm for LTE-A System
(Articles)
Xuanli Wu
,
Lukuan Sun
,
Mingxin Luo
Communications and Network
Vol.5 No.2B
,July 10, 2013
DOI:
10.4236/cn.2013.52B005
3,104
Downloads
4,728
Views
Citations
A Case Study on Security Recommendations for a Global Organization
(Articles)
Devashi Tandon
,
Pratyush Parimal
Journal of Computer and Communications
Vol.6 No.3
,March 28, 2018
DOI:
10.4236/jcc.2018.63010
833
Downloads
5,231
Views
Citations
Dynamic Detection on Airflow for Vehicle Intake System Based-on Hot-Film Anemometry Sensors
(Articles)
Rong-Hua Ma
,
Tsung-Sheng Sheu
Journal of Transportation Technologies
Vol.1 No.1
,March 2, 2011
DOI:
10.4236/jtts.2011.11001
4,230
Downloads
8,499
Views
Citations
A Personnel Detection Algorithm for an Intermodal Maritime Application of ITS Technology for Security at Port Facilities
(Articles)
Mouhammad K. Al Akkoumi
,
Robert C. Huck
,
James J. Sluss
Journal of Transportation Technologies
Vol.1 No.4
,October 24, 2011
DOI:
10.4236/jtts.2011.14016
4,898
Downloads
8,238
Views
Citations
Development of a Client-Server System for 3D Scene Change Detection
(Articles)
Haoming Wang
,
Baowei Lin
,
Toru Tamaki
,
Bisser Raytchev
,
Kazufumi Kaneda
,
Koji Ichii
Journal of Software Engineering and Applications
Vol.6 No.7B
,October 23, 2013
DOI:
10.4236/jsea.2013.67B004
3,101
Downloads
4,357
Views
Citations
Study on Voltage Sag Detection of Wind Power System Based on HHT
(Articles)
Yanqing Li
,
Ting Yue
,
Hongling Xie
,
Feilong Wang
Energy and Power Engineering
Vol.5 No.4B
,November 12, 2013
DOI:
10.4236/epe.2013.54B176
4,510
Downloads
5,496
Views
Citations
The Influence of Seawater on a Coastal Aquifer in an International Protected Area, Göksu Delta Turkey
(Articles)
Zeynel Demirel
Journal of Water Resource and Protection
Vol.2 No.7
,July 23, 2010
DOI:
10.4236/jwarp.2010.27075
4,311
Downloads
7,920
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top