Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Exploring the Characteristics of Data Breaches: A Descriptive Analytic Study
(Articles)
Dominik Molitor
,
Aditya Saharia
,
Viju Raghupathi
,
Wullianallur Raghupathi
Journal of Information Security
Vol.15 No.2
,April 2, 2024
DOI:
10.4236/jis.2024.152011
78
Downloads
484
Views
Citations
The Impact of Recommendation Algorithms: Analyzing the Influence of Data on Marketing Strategies in the Media Sector
(Articles)
Amiruthaa Amudharasan
Open Journal of Business and Management
Vol.11 No.6
,November 28, 2023
DOI:
10.4236/ojbm.2023.116184
77
Downloads
305
Views
Citations
This article belongs to the Special Issue on
Organizational and Business Management
The Impact of Cyber Security on Business: How to Protect Your Business
(Articles)
Emiles Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.2
,June 30, 2023
DOI:
10.4236/ojsst.2023.132003
489
Downloads
5,570
Views
Citations
Critical Role of Cyber Security in Global Economy
(Articles)
Emile S. Mbungu Kala
Open Journal of Safety Science and Technology
Vol.13 No.4
,December 25, 2023
DOI:
10.4236/ojsst.2023.134012
94
Downloads
858
Views
Citations
Improved Data Discrimination in Wireless Sensor Networks
(Articles)
B. A. Sabarish
,
S. Shanmugapriya
Wireless Sensor Network
Vol.4 No.4
,April 24, 2012
DOI:
10.4236/wsn.2012.44016
4,985
Downloads
8,712
Views
Citations
CAND-IDS: A Novel Context Aware Intrusion Detection System in Cooperative Wireless Sensor Networks by Nodal Node Deployment
(Articles)
Rathinam Gopal
,
Velusamy Parthasarathy
Circuits and Systems
Vol.7 No.11
,September 7, 2016
DOI:
10.4236/cs.2016.711298
1,248
Downloads
2,286
Views
Citations
A Compact Trust Computation and Management Approach for Defending against Derailed Attacks for Wireless Sensor Networks and Its Applications
(Articles)
R. Mohan Kumar
,
A. V. Ram Prasad
Circuits and Systems
Vol.7 No.10
,August 24, 2016
DOI:
10.4236/cs.2016.710275
1,759
Downloads
2,578
Views
Citations
Gender Differences in Information Security Management
(Articles)
Fayez Alotaibi
,
Aziz Alshehri
Journal of Computer and Communications
Vol.8 No.3
,March 9, 2020
DOI:
10.4236/jcc.2020.83006
1,015
Downloads
3,189
Views
Citations
This article belongs to the Special Issue on
Information, Network & Computer Security
Recurrent Neural Networks & Deep Neural Networks Based on Intrusion Detection System
(Articles)
Rabeb Zarai
,
Mnaouer Kachout
,
Mohamed A. G. Hazber
,
Mohammed A. Mahdi
Open Access Library Journal
Vol.7 No.3
,March 25, 2020
DOI:
10.4236/oalib.1106151
973
Downloads
3,439
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,211
Downloads
15,593
Views
Citations
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
170
Downloads
1,390
Views
Citations
Category-Based Intrusion Detection Using PCA
(Articles)
Gholam Reza Zargar
,
Tania Baghaie
Journal of Information Security
Vol.3 No.4
,October 31, 2012
DOI:
10.4236/jis.2012.34033
5,637
Downloads
9,509
Views
Citations
Application of Weighted Cross-Entropy Loss Function in Intrusion Detection
(Articles)
Ziyun Zhou
,
Hong Huang
,
Binhao Fang
Journal of Computer and Communications
Vol.9 No.11
,November 8, 2021
DOI:
10.4236/jcc.2021.911001
698
Downloads
10,807
Views
Citations
A Comparison of Link Layer Attacks on Wireless Sensor Networks
(Articles)
Shahriar Mohammadi
,
Reza Ebrahimi Atani
,
Hossein Jadidoleslamy
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22007
7,678
Downloads
15,960
Views
Citations
Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology
(Articles)
Emad Felemban
Int'l J. of Communications, Network and System Sciences
Vol.6 No.5
,May 15, 2013
DOI:
10.4236/ijcns.2013.65028
12,496
Downloads
23,179
Views
Citations
Hardware Realization of Artificial Neural Network Based Intrusion Detection & Prevention System
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
Journal of Information Security
Vol.5 No.4
,September 25, 2014
DOI:
10.4236/jis.2014.54015
5,872
Downloads
7,817
Views
Citations
Anomaly Detection of Store Cash Register Data Based on Improved LOF Algorithm
(Articles)
Ke Long
,
Yuhang Wu
,
Yufeng Gui
Applied Mathematics
Vol.9 No.6
,June 29, 2018
DOI:
10.4236/am.2018.96049
1,095
Downloads
2,405
Views
Citations
Ontology-Based Cyber Security Policy Implementation in Saudi Arabia
(Articles)
Amir Mohamed Talib
,
Fahad Omar Alomary
,
Hanan Fouad Alwadi
,
Rawan Rashed Albusayli
Journal of Information Security
Vol.9 No.4
,October 26, 2018
DOI:
10.4236/jis.2018.94021
1,516
Downloads
3,540
Views
Citations
A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy
(Articles)
Yuji Waizumi
,
Hiroshi Tsunoda
,
Masashi Tsuji
,
Yoshiaki Nemoto
Journal of Information Security
Vol.3 No.1
,December 31, 2011
DOI:
10.4236/jis.2012.31003
5,210
Downloads
9,403
Views
Citations
Digital Forensics and Cyber Crime Datamining
(Articles)
K. K. Sindhu
,
B. B. Meshram
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33024
24,750
Downloads
44,261
Views
Citations
<
...
2
3
4
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top