Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Development of a Platform to Explore Network Intrusion Detection System (NIDS) for Cybersecurity
(Articles)
Chee Keong Chan
,
Alexander Weil Tine Yeoh
Journal of Computer and Communications
Vol.6 No.1
,December 29, 2017
DOI:
10.4236/jcc.2018.61001
1,414
Downloads
4,779
Views
Citations
Software Intrusion Detection Evaluation System: A Cost-Based Evaluation of Intrusion Detection Capability
(Articles)
Agbotiname L. Imoize
,
Taiwo Oyedare
,
Michael E. Otuokere
,
Sachin Shetty
Communications and Network
Vol.10 No.4
,November 23, 2018
DOI:
10.4236/cn.2018.104017
1,985
Downloads
4,107
Views
Citations
General Study of Mobile Agent Based Intrusion Detection System (IDS)
(Articles)
Chandrakant Jain
,
Aumreesh Kumar Saxena
Journal of Computer and Communications
Vol.4 No.4
,April 13, 2016
DOI:
10.4236/jcc.2016.44008
3,044
Downloads
4,889
Views
Citations
A Network Intrusion Detection Model Based on Immune Multi-Agent
(Articles)
Nian LIU
,
Sunjun LIU
,
Rui LI
,
Yong LIU
Int'l J. of Communications, Network and System Sciences
Vol.2 No.6
,September 22, 2009
DOI:
10.4236/ijcns.2009.26063
5,854
Downloads
10,359
Views
Citations
Research on Access Network Intrusion Detection System Based on DMT Technology
(Articles)
Lingxi Wu
,
Jie Zhan
,
Qiange He
,
Shuiyan He
Int'l J. of Communications, Network and System Sciences
Vol.3 No.5
,May 31, 2010
DOI:
10.4236/ijcns.2010.35064
4,450
Downloads
8,291
Views
Citations
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
(Articles)
Rujiroj Tiengtavat
,
Wei-Ming Lin
Int'l J. of Communications, Network and System Sciences
Vol.4 No.5
,May 12, 2011
DOI:
10.4236/ijcns.2011.45037
4,340
Downloads
8,300
Views
Citations
Detection of Sophisticated Network Enabled Threats via a Novel Micro-Proxy Architecture
(Articles)
Andrew Blyth
Journal of Information Security
Vol.5 No.2
,March 12, 2014
DOI:
10.4236/jis.2014.52004
4,755
Downloads
6,566
Views
Citations
Information Theory and Data-Mining Techniques for Network Traffic Profiling for Intrusion Detection
(Articles)
Pablo Velarde-Alvarado
,
Rafael Martinez-Pelaez
,
Joel Ruiz-Ibarra
,
Victor Morales-Rocha
Journal of Computer and Communications
Vol.2 No.11
,September 12, 2014
DOI:
10.4236/jcc.2014.211003
3,567
Downloads
5,396
Views
Citations
A New FLAME Selection Method for Intrusion Detection (FLAME-ID)
(Articles)
Wafa Alsharafat
Communications and Network
Vol.11 No.1
,January 28, 2019
DOI:
10.4236/cn.2019.111002
890
Downloads
1,833
Views
Citations
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection
(Articles)
Gulshan Kumar
,
Krishan Kumar
International Journal of Intelligence Science
Vol.2 No.4A
,November 1, 2012
DOI:
10.4236/ijis.2012.224016
7,895
Downloads
14,372
Views
Citations
This article belongs to the Special Issue on
Data-Oriented Intelligence
Designing Intrusion Detection System for Web Documents Using Neural Network
(Articles)
Hari Om
,
Tapas K. Sarkar
Communications and Network
Vol.2 No.1
,March 1, 2010
DOI:
10.4236/cn.2010.21008
7,079
Downloads
13,692
Views
Citations
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
(Articles)
Indraneel Mukhopadhyay
,
Mohuya Chakraborty
,
Satyajit Chakrabarti
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21003
10,214
Downloads
23,496
Views
Citations
Intrusion Detection System with Remote Signalling for Vehicles Using an Arduino Controller and Radio-Frequency Technology
(Articles)
Senghor Abraham Gihonia
,
Rostin Makengo Mabela
,
René Gilles Bokolo
,
Eddy Kimba
,
Matondo Katshitshi
,
Matshitshi Kalombo
,
Michel Tshodi
,
Nathanael Kasoro Mulenda
Journal of Software Engineering and Applications
Vol.15 No.4
,April 19, 2022
DOI:
10.4236/jsea.2022.154006
270
Downloads
2,043
Views
Citations
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
(Articles)
L Prema RAJESWARI
,
Kannan ARPUTHARAJ
Int'l J. of Communications, Network and System Sciences
Vol.1 No.4
,October 18, 2008
DOI:
10.4236/ijcns.2008.14039
8,703
Downloads
14,771
Views
Citations
An Improved Artificial Immune System-Based Network Intrusion Detection by Using Rough Set
(Articles)
Junyuan Shen
,
Jidong Wang
,
Hao Ai
Communications and Network
Vol.4 No.1
,February 27, 2012
DOI:
10.4236/cn.2012.41006
6,301
Downloads
11,544
Views
Citations
Role of Cross Layer Based Intrusion Detection System for Wireless Domain
(Articles)
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences
Vol.5 No.2
,February 28, 2012
DOI:
10.4236/ijcns.2012.52010
4,953
Downloads
9,203
Views
Citations
Feedback Reliability Ratio of an Intrusion Detection System
(Articles)
Usha Banerjee
,
Gaurav Batra
,
K. V. Arya
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33030
4,964
Downloads
9,317
Views
Citations
Optimizing Operating Cost of an Intrusion Detection System
(Articles)
Usha Banerjee
,
K. V. Arya
Int'l J. of Communications, Network and System Sciences
Vol.6 No.1
,January 29, 2013
DOI:
10.4236/ijcns.2013.61004
5,644
Downloads
8,498
Views
Citations
A Multi-Leveled Approach to Intrusion Detection and the Insider Threat
(Articles)
Rita M. Barrios
Journal of Information Security
Vol.4 No.1
,January 30, 2013
DOI:
10.4236/jis.2013.41007
6,865
Downloads
11,168
Views
Citations
Support Vector Machine and Random Forest Modeling for Intrusion Detection System (IDS)
(Articles)
Md. Al Mehedi Hasan
,
Mohammed Nasser
,
Biprodip Pal
,
Shamim Ahmad
Journal of Intelligent Learning Systems and Applications
Vol.6 No.1
,February 14, 2014
DOI:
10.4236/jilsa.2014.61005
9,304
Downloads
15,150
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top