معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(282)
نوع البيانات
مقالات
(282)
اللغة
الإنجليزية
(282)
الدولة
مصر
(282)
المصدر
Security and Communication Networks
(282)
الفترة:
نتائج البحث
(
1
-
50
من
282
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks
By: Oliveira, Guilherme; Fernández, Evelio; Mafra, Samuel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks
By: Ngo, Duc-Minh; Pham-Quoc, Cuong; Ngoc Thinh, Tran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm
By: Zhao, Xiufeng; Angin, Pelin; Wang, Ailan. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”
By: Qiang, Weizhong; Wang, Shizhen; Jin, Hai…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-1, 1 p.
مقالات
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection
By: Kozik, Rafał; Pawlicki, Marek; Choraś, Michał…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping
By: Zhao, Xiufeng; Pan, Zhaoqing; Zhang, Bo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT
By: Liu, Xuefei; Zhang, Chao; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes
By: Wang, Xun; Luo, Tao; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment
By: Yang, Ming; Yuan, Yuan; Ling, Zhen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels
By: Tran, Phuong T.; Voznak, Miroslav; Geneiatakis, Dimitrios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
By: Nguyen, Thanh H.; Wright, Mason; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-28, 28 p.
مقالات
Robust Visual Secret Sharing Scheme Applying to QR Code
By: Tan, Longdan; Liu, Kesheng; Xiong, Naixue…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks
By: Wang, Qi; Gómez-Skarmeta, Antonio F.; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
مقالات
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients
By: Kricha, Zied; Sakly, Anis; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Asynchronous Group Authentication Based on Geometric Approach
By: Wang, Hong; Li, Jianhua; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model
By: Ro, Inwoo; Im, Eul Gyu; Tolomei, Gabriele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining
By: Li, Chen; Guo, Yecai; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization
By: Azam, Naveed Ahmed; Hayat, Umar; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Use of Data Visualisation for Zero-Day Malware Detection
By: Venkatraman, Sitalakshmi; Alazab, Mamoun; Yang, Qing. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud
By: Fu, Zhangjie; Xingming, Sun; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Identity-Based Proxy Signcryption Protocol with Universal Composability
By: Yu, Huifang; Wang, Zhicang; Peinado, A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
GANs Based Density Distribution Privacy-Preservation on Mobility Data
By: Yin, Dan; Ma, Liran; Yang, Qing. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Construction of a New Biometric-Based Key Derivation Function and Its Application
By: Seo, Minhye; Lee, Dong Hoon; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users
By: Yesiltepe, Mirsat; Kurulay, Muhammet; Conti, Vincenzo. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
By: Zhou, Zequan; Mao, Jian; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Practical Suitability and Experimental Assessment of Tree ORAMs
By: Al-Saleh, Kholoud; Belghith, Abdelfettah; Genge, Bela. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing
By: Cheng, Jieren; Sheng, Victor S.; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service
By: Song, Jian; Ma, Chuangui; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Research on Plaintext Restoration of AES Based on Neural Network
By: Hu, Xinyi; Yang, Ching-Nung; Zhao, Yaqun. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method
By: Wu, Zhendong; Yang, Jiajia; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking
By: Liu, Guangjie; Zhai, Jiangtao; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs
By: Jhaveri, Rutvij H.; Desai, Aneri; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN
By: Liu, Jianwei; Mao, Jian; Chen, Jie…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
مقالات
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model
By: Yin, Ke; Galdi, Clemente. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Network Intrusion Detection Method Based on PCA and Bayes Algorithm
By: Zhang, Bing; Ren, Jiadong; Choraś, Michał…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD
By: Nouioua, Imen; Amardjia, Nouredine; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
By: Pecori, Riccardo; Fernandez-Gago, Carmen; Veltri, Luca. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Behaviors of High-Frequency Subscribers in Cellular Data Networks
By: Li, Jingtao; Liu, Yang; Geneiatakis, Dimitrios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
A General Architecture for Multiserver Authentication Key Agreement with Provable Security
By: Choo, Kim-Kwang Raymond; Nicopolitidis, Petros; He, Debiao…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys
By: Saha, Rahul; Kumar, Gulshan; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network
By: Zhang, Jinquan; Yu, Jiguo; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos
By: Flores Siordia, Octavio; Gutiérrez, Juan Carlos Estrada; Radwan, Ahmed G.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition
By: Han, Qilong; Zhang, Kejia; Ma, Liran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things
By: Gao, Honghao; Qi, Lianyong; Wang, Xiaolin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
By: Kang, Baoyuan; Li, Chunqing; Vassilakopoulos, Michael…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments
By: Park, Cheolhee; Kim, Hyunil; Liu, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
By: Coruh, Uğur; Palomar, Esther; Bayat, Oguz. Security and Communication Networks. No. 2018 (2018), pp.1-25, 25 p.
مقالات
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications
By: Bilal, Muhammad; Asif, Muhammad; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism
By: Haguouche, Samira; Yeh, Kuo-Hui; Jarir, Zahi. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Privacy Preservation for Friend-Recommendation Applications
By: Wang, Weicheng; Wang, Shengling; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
«
1
2
3
4
5
6
»