معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(191)
نوع البيانات
مقالات
(191)
اللغة
الإنجليزية
(191)
الدولة
مصر
(191)
المصدر
Security and Communication Networks
(191)
الفترة:
نتائج البحث
(
101
-
150
من
191
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
By: Ren, Jiadong; Hu, Jing-jing; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Integrating Traffics with Network Device Logs for Anomaly Detection
By: Zhuo, Zhongliu; Hu, Teng; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Security Cryptanalysis of NUX for the Internet of Things
By: Liu, Yu; Liu, Xiaolei; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information
By: Pan, Zhisong; Guo, Shize; Ranchal, Rohit…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach
By: Yang, Lu-Xing; Yang, Xiaofan; Tang, Yuan Yan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
By: Zhan, Yu; Wang, Baocang; Megias, David. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
مقالات
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving
By: Xie, Yong; Zhang, Songsong; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
By: Wang, Baocang; Ping, Yuan; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-6, 6 p.
مقالات
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks
By: Yu, Nenghai; Radenkovic, Milena; Xiong, Ling…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices
By: Lee, Sanghoon; Araujo, Alvaro; Jeong, Ik Rae. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
By: Lu, Qian; Qu, Haipeng; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol
By: Abu Dhailah, Hala; Taqieddin, Eyad; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
A Practical Authentication Framework for VANETs
By: Wang, Baosheng; Wang, Yi; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
By: Song, Yujiao; Wang, Hao; Wu, Lei…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
By: Wang, Ping; Wang, Ding; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense
By: Niakanlahiji, Amirreza; Alazab, Mamoun; Jafarian, Jafar Haadi. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence
By: Park, Hojoong; Yeom, Yongjin; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group
By: Zhang, Yu; Li, Yin; Wang, Yifan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Anonymous and Efficient Message Authentication Scheme for Smart Grid
By: Zeadally, Sherali; Di Pietro, Roberto; He, Debiao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
By: E, Munivel; Cimato, Stelvio; A, Kannammal. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
By: Xu, Li; Xun, Yi; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
By: Maglaras, Leandros A.; Derhab, Abdelouahid; Bernal Bernabe, Jorge…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-20, 20 p.
مقالات
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity
By: Jafary, Peyman; Supponen, Antti; Wei, Jin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries
By: van Ginkel, Neline; De Groef, Willem; Massacci, Fabio…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
مقالات
Detection of Dummy Trajectories Using Convolutional Neural Networks
By: Pan, Jiaji; Zhang, Weiming; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
The Prediction of Serial Number in OpenSSL’s X.509 Certificate
By: Wang, Jizhi; Peinado, A.. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Erratum to “A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism”
By: Yuan, Ye; Wu, Liji; Yang, Yijun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-2, 2 p.
مقالات
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data
By: Ju, Ankang; Guo, Yuanbo; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic
By: Khatibzadeh, Leila; Bornaee, Zarrintaj; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Dynamic Resource Provisioning on Fog Landscapes
By: Pham-Nguyen, Hoang-Nam; Nicopolitidis, Petros; Tran-Minh, Quang. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News
By: Lago, Federica; Phan, Quoc-Tin; Boato, Giulia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach
By: Dang, Tran Khanh; Yeh, Kuo-Hui; Tran, Khanh T. K.. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
مقالات
Corrigendum to “Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing”
By: Cheng, Jieren; Li, Mengyang; Sheng, Victor S.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
مقالات
Optimizing Computer Worm Detection Using Ensembles
By: Ochieng, Nelson; Waweru Mwangi, Ronald; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Security Measure for Image Steganography Based on High Dimensional KL Divergence
By: Song, Haitao; Tang, Guangming; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing
By: He, Lei; Ma, Jianfeng; Palomar, Esther…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Corrigendum to “Development of the ECAT Preprocessor with the Trust Communication Approach”
By: Ovaz Akpinar, Kevser; Ozcelik, Ibrahim. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
مقالات
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks
By: Jeong, Young-Seob; Woo, Jiyoung; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
By: Choi, Joseph I.; Butler, Kevin R. B.; Genge, Bela. Security and Communication Networks. No. 2019 (2019), pp.1-28, 28 p.
مقالات
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid
By: Xiong, Yinqiao; Zhu, Peidong; Palomar, Esther…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment
By: Liu, Wenjie; Chen, Hanwu; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization
By: Zhao, Yuntao; Bo, Bo; Feng, Yongxin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem
By: Chen, Hefeng; Chang, Chin-Chen; D’Antonio, Salvatore. Security and Communication Networks. No. 2019 (2019), pp.1-7, 7 p.
مقالات
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree
By: Ustimenko, Vasyl; Romańczuk-Polubiec, Urszula; Wróblewska, Aneta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
By: Abu Zant, Mahmoud; Gope, Prosanta; Yasin, Adwan. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication
By: Lu, Tianbo; Meng, Ting; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model
By: Oh, Junhyoung; Lee, Kyungho; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Dynamic Nonparametric Random Forest Using Covariance
By: Choi, Seok-Hwan; Shin, Jin-Myeong; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things
By: Zhou, Yu; Wei, Yongzhuang; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key
By: Salguero Dorokhin, Édgar; Fuertes, Walter; Yeh, Kuo-Hui…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
«
1
2
3
4
»