معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(191)
نوع البيانات
مقالات
(191)
اللغة
الإنجليزية
(191)
الدولة
مصر
(191)
المصدر
Security and Communication Networks
(191)
الفترة:
نتائج البحث
(
51
-
100
من
191
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis
By: Choi, Mi-Jung; Kim, Hajin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN
By: Yu, Haisheng; Li, Keqiu; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Smart Detection: An Online Approach for DoSDDoS Attack Detection Using Machine Learning
By: Lima Filho, Francisco Sales de; Silveira, Luiz F. Q.; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Multidivisible OnlineOffline Cryptography and Its Application to Signcryptions
By: Yamamoto, Dan; Kapron, Bruce M.; Ogata, Wakaha. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
مقالات
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy
By: Yu, Chuan; Cai, Z.; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis
By: Kim, Daegeon; Kim, Huy Kang; Nepal, Surya. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications
By: Han, Bo; Yin-Liang, Zhao; Zhang, Kuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network
By: Lai, Yingxu; Zhang, Jingwen; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Privacy Protection of Social Networks Based on Classified Attribute Encryption
By: Huang, Hai-ping; Fu, Xiong; Wang, Ru-chuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Power Grid Estimation Using Electric Network Frequency Signals
By: Bang, Woorim; Yoon, Ji Won; Schrittwieser, Sebastian. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators’ Self-Assessment Errors
By: Kamola, Mariusz; Galdi, Clemente. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
Detection of Free-Form Copy-Move Forgery on Digital Images
By: Ulutas, Guzin; Ulutas, Mustafa; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Automatic Identification of Honeypot Server Using Machine Learning Techniques
By: Huang, Cheng; Han, Jiaxuan; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
A Malware and Variant Detection Method Using Function Call Graph Isomorphism
By: Bai, Jinrong; Shi, Qibin; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Generative Reversible Data Hiding by Image-to-Image Translation via GANs
By: Zhang, Zhuo; Fu, Guangyuan; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Evaluating the Impact of Name Resolution Dependence on the DNS
By: Xu, Haiyan; Zhang, Zhaoxin; Schrittwieser, Sebastian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
A Data-Driven Approach to Cyber Risk Assessment
By: Baldi, Marco; Chiaraluce, Franco; Kim, Hyoungshick…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
A Novel Trust Model Based on Node Recovery Technique for WSN
By: Qi, Ping; Wang, Fucheng; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks
By: Gao, Yunpeng; Song, Houbing; Zhang, Nan. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
By: Emura, Keita; Hanaoka, Goichiro; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-36, 36 p.
مقالات
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
By: Wang, Feifei; Xu, Guoai; Gu, Lize…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection
By: Zheng, Kangfeng; Wu, Chunhua; Yang, Yixian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT
By: Yin, Mingyong; Chen, Xingshu; Wang, Wei…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization
By: Adebayo, Olawale Surajudeen; Gimenez-Guzman, Jose Manuel; Abdul Aziz, Normaziah. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Comprehensive Risk Identification Model for SCADA Systems
By: Elhady, Abdelghafar M.; El-bakry, Hazem; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-24, 24 p.
مقالات
Detecting Shilling Attacks with Automatic Features from Multiple Views
By: Zhao, Qingshan; Cao, Jianfang; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Linear ( t , n ) Secret Sharing Scheme with Reduced Number of Polynomials
By: Phiri, Kenan Kingsley; Kim, Hyunsung; Hussain, Mehdi. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention
By: Iraqi, Omar; El Bakkali, Hanan; Calzavara, Stefano. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
By: Khalid, Madiha; Nicopolitidis, Petros; Najam-Ul-Islam, Muhammad…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-25, 25 p.
مقالات
Comment on “Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”
By: Qu, Zhen; Djordjevic, Ivan B.; Armknecht, Frederik. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
مقالات
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant
By: Wang, Jin; Sangaiah, Arunkumar; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
ID-Based Strong Designated Verifier Signature over R-SIS Assumption
By: Zheng, Zhihua; Xu, Qiuliang; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
A Novel Method for Location Privacy Protection in LBS Applications
By: Lu, Dan; Han, Qilong; Zhang, Kejia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Security Requirements Engineering in Safety-Critical Railway Signalling Networks
By: Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
By: Albakri, Ashwag; Harn, Lein; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users
By: Feng, Bo; Li, Qiang; Genge, Bela…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
A Distributed Access Control with Outsourced Computation in Fog Computing
By: Wang, Qihua; Wang, Huaqun; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things
By: Zheng, Dong; Li, Fagen; Qin, Baodong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
Efficient Cancelable Iris Template Generation for Wearable Sensors
By: Jeong, Jae Yeol; Jeong, Ik Rae; Maiorana, Emanuele. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
An Approach Enabling Various Queries on Encrypted Industrial Data Stream
By: Wang, Tao; Yang, Bo; Harn, Lein…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Recent Advancements in Intrusion Detection Systems for the Internet of Things
By: Khan, Zeeshan Ali; Alcaraz Calero, Jose M.; Herrmann, Peter. Security and Communication Networks. No. 2019 (2019), pp.1-19, 19 p.
مقالات
Random Fault Attacks on a Class of Stream Ciphers
By: Bartlett, Harry; Dawson, Ed; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis
By: Zhao, Fangzheng; Zhang, Jie; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification
By: Xu, Dawen; Megias, David; Su, Shubing. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
A Secure Data Sharing Scheme with Designated Server
By: Zhu, Binrui; Ma, Jixin; Yeh, Kuo-Hui…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
Fingerprint Protected Password Authentication Protocol
By: Yang, Chao; Yang, Li; Ma, Jianfeng…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems
By: Thwin, Thein Than; Vasupongayya, Sangsuree; Gope, Prosanta. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
By: Wang, Feifei; Xu, Guoai; Wang, Chenyu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
A Novel Device Identification Method Based on Passive Measurement
By: Sun, Wei; Jiang, Jianguo; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
By: Kholidy, Hisham A.; Erradi, Abdelkarim; Ranchal, Rohit. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
«
1
2
3
4
»