• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4607200)   Today's Articles (1617)   Subscriber (49374)
For:  [Subscribe] [Scholar Register]
Number Cited by Other Article(s)
1
Application of data mining technology in detecting network intrusion and security maintenance. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2020-0146] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]  Open
2
Wang L, Abbas R, Almansour FM, Gaba GS, Alroobaea R, Masud M. An empirical study on vulnerability assessment and penetration detection for highly sensitive networks. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2020-0145] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]  Open
3
A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far. INFORMATION 2019. [DOI: 10.3390/info10110337] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
4
Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage. CYBERNETICS AND INFORMATION TECHNOLOGIES 2019. [DOI: 10.2478/cait-2019-0003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA