11 results for intrusion.

Parameters for your search query:
Keyword    intrusion

Open AccessReview Article
Export: RIS | BibTeX | EndNote
Big Data in Intrusion Detection Systems and Intrusion Prevention Systems
Journal of Computer Networks. 2017, 4(1), 48-55. DOI: 10.12691/jcn-4-1-5
Pub. Date: August 19, 2017Views: 31400Downloads: 25724
Open AccessReview Article
Export: RIS | BibTeX | EndNote
A Survey on Secure Network: Intrusion Detection & Prevention Approaches
American Journal of Information Systems. 2016, 4(3), 69-88. DOI: 10.12691/ajis-4-3-2
Pub. Date: December 03, 2016Views: 31707Downloads: 25624
Open AccessReview Article
Export: RIS | BibTeX | EndNote
Low Cost Rainwater Harvesting: An Alternate Solution to Salinity Affected Coastal Region of Bangladesh
American Journal of Water Resources. 2014, 2(6), 141-148. DOI: 10.12691/ajwr-2-6-2
Pub. Date: December 22, 2014Views: 27988Downloads: 19896Citations: 4
Figure of 7
Open AccessSpecial Issue
Export: RIS | BibTeX | EndNote
A Data Analytics System for Network Intrusion Detection Using Decision Tree
Journal of Computer Sciences and Applications. 2020, 8(1), 21-29. DOI: 10.12691/jcsa-8-1-4
Pub. Date: June 04, 2020Views: 1729Downloads: 1457
Open AccessArticle
Export: RIS | BibTeX | EndNote
Saline Water Intrusion in Urban Coastal Area: A Case Study of Kuttiyadi River, Kerala, India
American Journal of Water Resources. 2020, 8(3), 128-133. DOI: 10.12691/ajwr-8-3-3
Pub. Date: May 31, 2020Views: 1310Downloads: 1161
Open AccessArticle
Export: RIS | BibTeX | EndNote
Internal Threats from CSPs and the Continuance Intention to Use Cloud Computing
International Transaction of Electrical and Computer Engineers System. 2019, 6(1), 1-7. DOI: 10.12691/iteces-6-1-1
Pub. Date: January 10, 2019Views: 6400Downloads: 5207
Open AccessArticle
Export: RIS | BibTeX | EndNote
Hydrodynamic and Hydro-geochemical Processes in the Catchment Area of Lake Retba and Their Implications in Relationship between Groundwater, Lake and Ocean
American Journal of Water Resources. 2016, 4(4), 91-101. DOI: 10.12691/ajwr-4-4-3
Pub. Date: October 31, 2016Views: 14208Downloads: 11725
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Collaborative Intrusion Detection in Federated Cloud Environments
Journal of Computer Sciences and Applications. 2015, 3(3A), 10-20. DOI: 10.12691/jcsa-3-3A-2
Pub. Date: July 23, 2015Views: 12929Downloads: 10037Citations: 2
This article belongs to the Special Issue Big Data Analytics in Intelligent Systems
Open AccessResearch Article
Export: RIS | BibTeX | EndNote
Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems
Journal of Computer Sciences and Applications. 2015, 3(3A), 1-9. DOI: 10.12691/jcsa-3-3A-1
Pub. Date: July 23, 2015Views: 14056Downloads: 11004Citations: 2
This article belongs to the Special Issue Big Data Analytics in Intelligent Systems
Open AccessArticle
Export: RIS | BibTeX | EndNote
Identification of Hidden VoIP (Grey Traffic)
Journal of Computer Networks. 2013, 1(2), 15-27. DOI: 10.12691/jcn-1-2-1
Pub. Date: May 19, 2013Views: 36645Downloads: 23343
Figure of 9
Results: sort by Relevance

Filter by

Date

Published between:

and

Subjects


Journals





Article Types