معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(155)
نوع البيانات
مقالات
(155)
اللغة
الإنجليزية
(155)
الدولة
مصر
(155)
المصدر
Security and Communication Networks
(155)
الفترة:
نتائج البحث
(
1
-
50
من
155
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data
By: Liu, Zhen; Meng, Huanyu; Cai, Z.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
By: Zhang, Ru; Huo, Yanyu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
By: Meng, Qian; Ma, Jianfeng; Chen, Kefei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
By: Zheng, Kangfeng; Yang, Yixian; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
A Survey on Breaking Technique of Text-Based CAPTCHA
By: Luo, Xiangyang; Gong, Daofu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature
By: Chiou, Shin-Yan; Wang, Tsung-Ju; Chen, Jiun-Ming…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
By: Chen, Hao; Wang, Tao; Park, Namje…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark
By: Guo, Xing; Zhang, Yiwen; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
By: Liu, Yi; Zhang, Hongqi; Han, Guangjie…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process
By: Yin, Ke; Conti, Vincenzo. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing
By: Li, Ji; Wei, Jianghong; Hu, Xuexian…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
By: Liu, Keyang; Zhang, Weiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
By: Han, Shuai; Liu, Shengli; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-27, 27 p.
مقالات
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation
By: Xia, Xiaona; Yu, Jiguo; Liu, Chang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Detecting Web-Based Botnets Using Bot Communication Traffic Features
By: Hsu, Fu-Hau; Ou, Chih-Wen; Hwang, Yan-Ling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG
By: Madani, Mahdi; Tanougast, Camel; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
By: Zhang, Hua; Wen, Qiaoyan; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Multiuser Searchable Encryption with Token Freshness Verification
By: Sharma, Dhruti; Jinwala, Devesh C.; Zeadally, Sherali. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks
By: Li, Feng; Si, Yali; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
By: Iturbe, Mikel; Zurutuza, Urko; Uribeetxeberria, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Protecting Private Data by Honey Encryption
By: Yin, Wei; Indulska, Jadwiga; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
By: Li, Tong; Zheng, Yuhui; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
By: Yang, Wenjie; Weng, Jian; Luo, Weiqi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map
By: Razaq, Abdul; Yousaf, Awais; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders
By: Yu, Yang; Cai, Z.; Mazurczyk, Wojciech…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
By: Liu, Yujia; Yu, Nenghai; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
An Edge Correlation Based Differentially Private Network Data Release Method
By: Lu, Junling; Zhang, Lichen; Song, Houbing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine
By: Wang, Ming-Hung; Lei, Chin-Laung; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
A Multidomain Survivable Virtual Network Mapping Algorithm
By: Xiao, Xiancui; Zheng, Xiangwei; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
By: Sharma, Vishal; Lee, Kyungroul; Gómez-Skarmeta, Antonio F.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-24, 24 p.
مقالات
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments
By: Rong, Hong; Wang, Huimei; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining
By: Li, Shuo; Wei, Jianguo; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks
By: Hu, Donghui; Shen, Qiang; Zhou, Shengnan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds
By: Xu, Xiaolong; Zhao, Xuan; Dou, Wanchun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints
By: Kuang, Li; Wang, Yin; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks
By: Kamarudin, Muhammad Hilmi; Maple, Carsten; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
Corrigendum to “Research on a New Signature Scheme on Blockchain”
By: Yuan, Chao; Xu, Mi-xue; Si, Xue-ming. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
مقالات
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
By: Chung, Tae Sun; Rizvi, Sanam Shahla; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Authentication Protocols for Internet of Things: A Comprehensive Survey
By: Maglaras, Leandros A.; Jiang, Jianmin; Shu, Lei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-41, 41 p.
مقالات
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment
By: Mao, Jian; Liu, Jianwei; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Remotely Exploiting AT Command Attacks on ZigBee Networks
By: Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
By: Zhang, Guoyin; Kou, Liang; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Android Rooting: An Arms Race between Evasion and Detection
By: Nguyen-Vu, Long; Chau, Ngoc-Tu; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing
By: Andrysiak, Tomasz; Saganowski, Łukasz; Kiedrowski, Piotr…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Privacy-Preserving Biometric Authentication: Challenges and Directions
By: Pagnin, Elena; Mitrokotsa, Aikaterini; Wang, Ding. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks
By: Khasawneh, Mahmoud; Agarwal, Anjali; Antonopoulos, Angelos. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups
By: Zhang, Jie; Ma, Chuangui; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
By: Zhang, Huanguo; Hu, Jiankun; Shi, Yuan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection
By: Kozik, Rafał; Garcia-Teodoro, P.; Choraś, Michał. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Segmentation Based Video Steganalysis to Detect Motion Vector Modification
By: Wang, Peipei; Cao, Yun; Zhao, Xianfeng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
«
1
2
3
4
»