معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(282)
نوع البيانات
مقالات
(282)
اللغة
الإنجليزية
(282)
الدولة
مصر
(282)
المصدر
Security and Communication Networks
(282)
الفترة:
نتائج البحث
(
101
-
150
من
282
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation
By: Thanigaivelan, Nanda Kumar; Nigussie, Ethiopia; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Closer Look at Intrusion Detection System for Web Applications
By: Agarwal, Nancy; Conti, Vincenzo; Hussain, Syed Zeeshan. Security and Communication Networks. No. 2018 (2018), pp.1-27, 27 p.
مقالات
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model
By: Li, Yang; Wang, Jian; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Improved Construction for Inner Product Functional Encryption
By: Zhao, Qingsong; Nicopolitidis, Petros; Liu, Ximeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution
By: Li, Ming; Zhang, En; Sun, Lin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection
By: Zhang, Zhaohui; Pan, Zhaoqing; Wang, Pengwei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms
By: Mohammadrezaei, Mohammadreza; Shiri, Mohammad Ebrahim; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
By: Hu, Hao; Zhang, Hongqi; Zhang, Yuchen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
High Embedding Capacity Data Hiding Algorithm for H.264AVC Video Sequences without Intraframe Distortion Drift
By: Nguyen, Dinh-Chien; Nguyen, Thai-Son; Chang, Chin-Chen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
By: An, Xingshuo; Lin, Fuhong; Xu, Shenggang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Deep Learning Approaches for Predictive Masquerade Detection
By: Elmasry, Wisam; Akbulut, Akhan; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
مقالات
WS 3 N: Wireless Secure SDN-Based Communication for Sensor Networks
By: Pereira, Geovandro C. C. F.; Albertini, Bruno C.; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Bootstrapping of FHE over the Integers with Large Message Space
By: Lian, Zhizhu; Hu, Yupu; Wang, Baocang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications
By: Carvajal-Gámez, Blanca Esther; Maglaras, Leandros A.; Diaz-Casco, Manuel Alejandro. Security and Communication Networks. No. 2018 (2018), pp.1-29, 29 p.
مقالات
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme
By: Bai, Shuangjie; Yang, Geng; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Trust Management in Collaborative Systems for Critical Infrastructure Protection
By: Ait Aali, Nawal; Baina, Amine; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks
By: Zare-Garizy, Tirazheh; Fridgen, Gilbert; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Moving Target Defense Techniques: A Survey
By: Lei, Cheng; Tan, Jinglei; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-25, 25 p.
مقالات
A Security Sandbox Approach of Android Based on Hook Mechanism
By: Jiang, Xin; Liu, Mingzhe; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Street-Level Landmark Evaluation Based on Nearest Routers
By: Li, Ruixiang; Qi, Lianyong; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties
By: Zhu, Liehuang; Li, Meng; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
By: Park, Won; Lee, Kyungho; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization
By: Chang, Chin-Chen; Mao, Xiaoyang; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Efficient Isogeny Computations on Twisted Edwards Curves
By: Kim, Suhri; Hong, Seokhie; Lee, Mun-Kyu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting
By: Rondeau, Christopher M.; Temple, Michael A.; Genge, Bela…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Design and Analysis of Push Notification-Based Malware on Android
By: Hyun, Sangwon; Palmieri, Francesco; Kim, Hyoungshick…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Secure and Efficient Image Retrieval over Encrypted Cloud Data
By: Liang, Haihua; Zhang, Xinpeng; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency
By: Park, Youngho; You, Ilsun; Rhee, Kyung-Hyune…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Android Malware Characterization Using Metadata and Machine Learning Techniques
By: Martín, Ignacio; Hernández, José Alberto; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
By: Long, Jun; Liu, Qiang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
By: Seo, Seog Chung; Li, Huaizhi; Youn, Taek-Young. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
By: Yang, Geng; Xiang, Yang; Dai, Hua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Security Evaluation Framework for Military IoT Devices
By: Baek, Seungsoo; Kim, Seungjoo; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Network Programming and Probabilistic Sketching for Securing the Data Plane
By: Chehab, Ali; Di Pietro, Roberto; Kayssi, Ayman…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-23, 23 p.
مقالات
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map
By: Anees, Amir; Hussain, Iqtadar; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
مقالات
Session Fingerprinting in Android via Web-to-App Intercommunication
By: Alepis, Efthimios; Wang, Guojun; Patsakis, Constantinos. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Blockchain Based Credibility Verification Method for IoT Entities
By: Qu, Chao; Tao, Ming; Wang, Wei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme
By: Liu, Ying-Ying; Conti, Vincenzo; Chu, Yun-kai. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience
By: Zhang, Yinghui; Zheng, Dong; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Winternitz Signature Scheme Using Nonadjacent Forms
By: Roh, Dongyoung; Jung, Sangim; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
By: Hu, Jiankun; Alazab, Mamoun; Ma, Jixin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(2m) Based on Montgomery Arithmetic
By: Schramm, Martin; Dojen, Reiner; Ahmed, Fawad…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
By: Jung, Jaewook; Lee, Youngsook; Won, Dongho…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis
By: Liu, Zhenyan; Zeng, Yifei; Xue, Jingfeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework
By: Shim, Jaewoo; Park, Minkyu; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
By: Wang, Gicheol; Cho, Gihwan; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
By: Li, Tong; You, Ilsun; Yan, Hongyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-6, 6 p.
مقالات
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things
By: Shi, Lianmin; Wang, Yihuai; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment
By: Xu, Zhiyan; He, Debiao; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
An Effective Classification Approach for Big Data Security Based on GMPLSMPLS Networks
By: Alouneh, Sahel; Ghinea, George; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
«
1
2
3
4
5
6
»