Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Implementation of Network Intrusion Detection System Using Soft Computing Algorithms (Self Organizing Feature Map and Genetic Algorithm)
(Articles)
Joël T. Hounsou
,
Thierry Nsabimana
,
Jules Degila
Journal of Information Security
Vol.10 No.1
,December 4, 2018
DOI:
10.4236/jis.2019.101001
1,625
Downloads
3,810
Views
Citations
A 5G Perspective of an SDN-Based Privacy-Preserving Scheme for IoT Networks
(Articles)
Isaac Appiah
,
Xiaoming Jiang
,
Edward Kwadwo Boahen
,
Ebenezer Owusu
Int'l J. of Communications, Network and System Sciences
Vol.16 No.8
,August 17, 2023
DOI:
10.4236/ijcns.2023.168012
128
Downloads
657
Views
Citations
A New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance
(Articles)
Rizik M. H. Al-Sayyed
,
Fawaz A. Al Zaghoul
,
Dima Suleiman
,
Mariam Itriq
,
Ismail Hababeh
Journal of Software Engineering and Applications
Vol.7 No.11
,October 20, 2014
DOI:
10.4236/jsea.2014.711080
9,105
Downloads
14,515
Views
Citations
Classification of Web Services Using Bayesian Network
(Articles)
Ramakanta Mohanty
,
V. Ravi
,
M. R. Patra
Journal of Software Engineering and Applications
Vol.5 No.4
,April 23, 2012
DOI:
10.4236/jsea.2012.54034
6,926
Downloads
11,494
Views
Citations
Experiments with Two New Boosting Algorithms
(Articles)
Xiaowei Sun
,
Hongbo Zhou
Intelligent Information Management
Vol.2 No.6
,June 29, 2010
DOI:
10.4236/iim.2010.26047
6,987
Downloads
11,365
Views
Citations
An Enhanced Secure Heuristic-Stochastic Routing Arithmetic in MPLS Network
(Articles)
Ying Zheng
Communications and Network
Vol.3 No.4
,November 16, 2011
DOI:
10.4236/cn.2011.34026
5,943
Downloads
9,011
Views
Citations
A Study on Forecasting System of Patent Registration Based on Bayesian Network
(Articles)
Gabjo Kim
,
Sangsung Park
,
Sunghae Jun
,
Yosup Kim
,
Dongjin Kang
,
Dongsik Jang
Intelligent Information Management
Vol.4 No.5A
,October 30, 2012
DOI:
10.4236/iim.2012.425040
5,175
Downloads
7,255
Views
Citations
This article belongs to the Special Issue on
Information System and Management
Classification of Hematological Data Using Data Mining Technique to Predict Diseases
(Articles)
Fahmida Akter
,
Md Altab Hossin
,
Golam Moktader Daiyan
,
Md. Motaher Hossain
Journal of Computer and Communications
Vol.6 No.4
,April 28, 2018
DOI:
10.4236/jcc.2018.64007
1,235
Downloads
3,577
Views
Citations
Assessment and Countermeasures for Offshore Wind Farm Risks Based on a Dynamic Bayesian Network
(Articles)
Chunhui Zhou
,
Xin Liu
,
Langxiong Gan
,
Yuanzhou Zheng
,
Qingyun Zhong
,
Kailiang Ge
,
Lei Zhang
Journal of Environmental Protection
Vol.9 No.4
,April 30, 2018
DOI:
10.4236/jep.2018.94024
839
Downloads
1,955
Views
Citations
Credit Scoring with Ego-Network Data
(Articles)
Stanley Sewe
,
Philip Ngare
,
Patrick Weke
Journal of Mathematical Finance
Vol.9 No.3
,August 22, 2019
DOI:
10.4236/jmf.2019.93027
535
Downloads
1,300
Views
Citations
Large Power Transformer Fault Diagnosis and Prognostic Based on DBNC and D-S Evidence Theory
(Articles)
Gang Li
,
Changhai Yu
,
Hui Fan
,
Shuguo Gao
,
Yu Song
,
Yunpeng Liu
Energy and Power Engineering
Vol.9 No.4B
,April 6, 2017
DOI:
10.4236/epe.2017.94B028
2,746
Downloads
3,918
Views
Citations
Comparison of Urban Growth Modeling Using Deep Belief and Neural Network Based Cellular Automata Model—A Case Study of Chennai Metropolitan Area, Tamil Nadu, India
(Articles)
Aishwarya Devendran Aarthi
,
Lakshmanan Gnanappazham
Journal of Geographic Information System
Vol.11 No.1
,January 21, 2019
DOI:
10.4236/jgis.2019.111001
1,622
Downloads
3,929
Views
Citations
This article belongs to the Special Issue on
Integration of RS and GIS
Hierarchical Representations Feature Deep Learning for Face Recognition
(Articles)
Haijun Zhang
,
Yinghui Chen
Journal of Data Analysis and Information Processing
Vol.8 No.3
,August 25, 2020
DOI:
10.4236/jdaip.2020.83012
793
Downloads
2,049
Views
Citations
Development of Global Geographical Coverage Area for Terrestrial Networks Internetworked with Leo Satellite Network
(Articles)
V. O. C. Eke
,
A. N. Nzeako
Communications and Network
Vol.6 No.4
,November 18, 2014
DOI:
10.4236/cn.2014.64025
5,272
Downloads
6,137
Views
Citations
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment
(Articles)
Nan Li
,
Chunhe Xia
,
Yi Yang
,
HaiQuan Wang
Journal of Software Engineering and Applications
Vol.1 No.1
,December 9, 2008
DOI:
10.4236/jsea.2008.11011
5,193
Downloads
9,322
Views
Citations
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,640
Downloads
9,516
Views
Citations
False Positive Responses Optimization for Intrusion Detection System
(Articles)
Jalal Baayer
,
Boubker Regragui
,
Aziz Baayer
Journal of Information Security
Vol.5 No.2
,February 20, 2014
DOI:
10.4236/jis.2014.52003
5,215
Downloads
9,209
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,759
Downloads
2,579
Views
Citations
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
(Articles)
Onyekware U. Oluoha
,
Terungwa S. Yange
,
George E. Okereke
,
Francis S. Bakpo
Journal of Information Security
Vol.12 No.4
,September 30, 2021
DOI:
10.4236/jis.2021.124014
514
Downloads
2,718
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
700
Downloads
10,844
Views
Citations
<
...
3
4
5
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top