معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(155)
نوع البيانات
مقالات
(155)
اللغة
الإنجليزية
(155)
الدولة
مصر
(155)
المصدر
Security and Communication Networks
(155)
الفترة:
نتائج البحث
(
101
-
150
من
155
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Noncooperative 802.11 MAC Layer Fingerprinting and Tracking of Mobile Devices
By: Quax, Peter; Lamotte, Wim; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
مقالات
Efficient Solutions to Two-Party and Multiparty Millionaires’ Problem
By: Liu, Xin; Li, Shundong; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners
By: Alsaleh, Mansour; Alomar, Noura; Al-Salman, Abdulmalik S.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System
By: Pan, Jiaye; Zhuang, Yi; Du, Xiaojiang. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
A Survey on Secure Wireless Body Area Networks
By: Zou, Shihong; Chen, Shanzhi; Lu, Rongxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection
By: Zheng, Kangfeng; Niu, Xinxin; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service
By: Gui, Xiaolin; An, Jian; Tian, Feng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems
By: Zhao, Ju-min; Li, Deng-ao; Rannenberg, Kai…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
An Efficient Context-Aware Privacy Preserving Approach for Smartphones
By: Zhang, Lichen; Li, Yingshu; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
RFA: R-Squared Fitting Analysis Model for Power Attack
By: Wang, An; Zhu, Liehuang; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM
By: Xu, Jianxin; Feng, Dongqin; Alazab, Mamoun. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Enc-DNS-HTTP: Utilising DNS Infrastructure to Secure Web Browsing
By: Hussain, Mohammed Abdulridha; Jin, Hai; Lorenz, Pascal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
By: Shehada, Dina; al-Qutayri, Mahmoud A.; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
Efficient Two-Step Protocol and Its Discriminative Feature Selections in Secure Similar Document Detection
By: Kim, Sang-Pil; Gil, Myeong-Sun; Choi, Mi-Jung…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks
By: Liu, Lan; Ko, Ryan K. L.; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
New Hybrid Features Selection Method: A Case Study on Websites Phishing
By: Rajab, Khairan D.; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party
By: Hua, Jingyu; Tang, An; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
A Secured Load Mitigation and Distribution Scheme for Securing SIP Server
By: Ganesan, Vennila; Masucci, Barbara; MSK, Manikandan. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud
By: Gan, Qingqing; Wang, Xiaoming; Wu, Daini…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Differential Privacy for Edge Weights in Social Networks
By: Li, Xiaoye; Yang, Jing; Zhang, Jianpei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks
By: Li, Peng; Xu, He; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Privacy Model for RFID Tag Ownership Transfer
By: Yang, Xingchun; Xu, Chun-xiang; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo
By: Han, Guoyong; Zhang, Wenying; Nasser, Nidal. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Secure Steganographic Algorithm Based on Frequency Domain for the Transmission of Hidden Information
By: Soria-Lorente, A.; Berres, S.; Masucci, Barbara. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents
By: Tsai, Chien-Hua; Antonopoulos, Angelos; Su, Pin-Chang. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks
By: Zhao, Zheng; Liu, Fenlin; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling
By: Nematollahi, Mohammad Ali; Vorakulpipat, Chalee; Gamboa-Rosales, Hamurabi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
By: Dalai, Asish Kumar; Choo, Kim-Kwang Raymond; Jena, Sanjay Kumar. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms
By: Hoang, Trong-Minh; Bui, Van-Kien; Gringoli, Francesco…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Protecting Information with Subcodstanography
By: Köhler, Mirko; Lukić, Ivica; Križanović Čik, Višnja…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker
By: Wazan, Ahmad Samer; Laborde, Romain; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-23, 23 p.
مقالات
Certificateless Public Auditing Protocol with Constant Verification Time
By: Kim, Dongmin; Jeong, Ik Rae; Khan, Muhammad Khurram. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Dynamic Rule Encryption for Mobile Payment
By: Husni, Emir; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Security Analysis of a Certificateless Signature from Lattices
By: Chang, Seunghwan; Lee, Hyang-Sook; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
مقالات
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications
By: Hu, Xiaoming; Tan, Wenan; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6
By: Lu, Y.; Wang, Meng; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Two-Phase Image Encryption Scheme Based on FFCT and Fractals
By: Mikhail, Mervat; Abouelseoud, Yasmine; ElKobrosy, Galal…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks
By: Roychoudhury, Probidita; Roychoudhury, Basav; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
مقالات
GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN
By: Gunasekaran, Mahalakshmi; Yang, Qing; Periakaruppan, Subathra. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Practical Implementation of an Adaptive Detection-Defense Unit against Link Layer DoS Attacks for Wireless Sensor Networks
By: Dener, Murat; Khan, Muhammad Khurram; Bay, Omer Faruk. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A Chaos-Based Authenticated Cipher with Associated Data
By: Teh, Je Sen; Caballero-Gil, P.; Samsudin, Azman. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Novel Noncommutative Cryptography Scheme Using Extra Special Group
By: Kumar, Gautam; Caballero-Gil, P.; Saini, Hemraj. Security and Communication Networks. No. 2017 (2017), pp.1-21, 21 p.
مقالات
Visible Watermarking Technique Based on Human Visual System for Single Sensor Digital Cameras
By: Santoyo-Garcia, Hector; Nakano-Miyatake, Mariko; Cilardo, Alessandro…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images
By: Chandrasekaran, Jeyamala; Thiruvengadam, S. J.; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives
By: Vorakulpipat, Chalee; Sirapaisan, Soontorn; Rattanalerdnusorn, Ekkachan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System
By: Parmar, Nishaal J.; Verma, Pramode K.; Martin, Vincente. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
مقالات
A Low-Complexity Region-Based Authentication Algorithm for 3D Polygonal Models
By: Tsai, Yuan-Yu; Cheng, Tsung-Chieh; Huang, Yao-Hsien…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Revocable ID-Based Signature with Short Size over Lattices
By: Hung, Ying-Hao; Khan, Muhammad Khurram; Huang, Sen-Shan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System
By: Krishnan Sadhasivan, Dhanalakshmi; Yan, Zheng; Balasubramanian, Kannapiran. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding
By: Azam, Naveed Ahmed; Lorenz, Pascal. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
«
1
2
3
4
»