معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(282)
نوع البيانات
مقالات
(282)
اللغة
الإنجليزية
(282)
الدولة
مصر
(282)
المصدر
Security and Communication Networks
(282)
الفترة:
نتائج البحث
(
201
-
250
من
282
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
By: Taleby Ahvanooey, Milad; Li, Qianmu; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-22, 22 p.
مقالات
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect
By: Gupta Banik, Barnali; Maiorana, Emanuele; Bandyopadhyay, Samir Kumar. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
مقالات
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
By: Wang, Chenyu; Xu, Guoai; Li, Shujun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things
By: Caminha, Jean; Perkusich, Angelo; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks
By: Zhang, Chunming; Karyotis, Vasileios. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs
By: Wang, Hongyu; Xu, Jin; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers
By: Mahmood, Shahid; Farwa, Shabieh; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
By: Jesus, Emanuel Ferreira; Chicarino, Vanessa R. L.; Gómez Mármol, Félix…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-27, 27 p.
مقالات
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments
By: Park, So Ryoung; Nam, Ilku; Noh, Sanguk…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
By: Wang, An; Zhu, Liehuang; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing
By: Zhu, Hongliang; Chen, Meiqi; Zhang, Xinpeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Analysis on Influential Functions in the Weighted Software Network
By: He, Haitao; Yan, Zheng; Guoyan, Huang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing
By: Zhang, Rui; Xiao, Di; Chang, Yanting…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks
By: Vu-Van, Hiep; Koo, Insoo; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Security and Privacy in the Medical Internet of Things: A Review
By: Sun, Wencheng; Cai, Z.; Li, Yangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
By: Jiang, Zhiyuan; Feng, Chao; Tang, Chaojing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
مقالات
Analysis of Software Implemented Low Entropy Masking Schemes
By: Wang, An; Maiorana, Emanuele; Wang, Xiaoyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Modification-Free Steganography Method Based on Image Information Entropy
By: ShuangKui, Xia; Qian, Zhenxing; Wu, Jianbin. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure
By: Gao, Xiu-e; Cilardo, Alessandro; Chen, Bo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Network Intrusion Detection with Threat Agent Profiling
By: Bajtoš, Tomáš; Gajdoš, Andrej; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System
By: Ren, Jiadong; Cheng, Yongqiang; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development
By: Kang, HyunSeo; Sung, YoonJe; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Secure Virtualization Environment Based on Advanced Memory Introspection
By: Zhang, Shuhui; Meng, Xiangxu; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme
By: Yang, XiaoYuan; Wang, Xu An; Sgandurra, Daniele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors
By: Lee, Hyungu; Hwang, Jung Yeon; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192
By: Jiang, Zi-Long; Jin, Chenhui; Liu, Zhe. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Vulnerability Analysis of Network Scanning on SCADA Systems
By: Coffey, Kyle; Maglaras, Leandros A.; Janicke, Helge…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
مقالات
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting
By: Lee, Suk-Hwan; Maiorana, Emanuele. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Detecting Malware with an Ensemble Method Based on Deep Neural Network
By: Yan, Jinpei; Qi, Yong; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption
By: Xiao, Dianyan; You, Ilsun; Yu, Yang. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
By: Ou, Lu; Yin, Hui; Qin, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate
By: Yao, Yu; Yang, Wei; Wang, Ying…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Close to Optimally Secure Variants of GCM
By: Zhang, Ping; Hu, Hong-Gang; Singh, Kamal Deep…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Leverage Website Favicon to Detect Phishing Websites
By: Chiew, Kang Leng; Choo, Jeffrey Soon-Fatt; Sze, San Nah…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors
By: Lu, Tianliang; Zhang, Lu; D’Arco, Paolo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks
By: Ma, Maode; Chen, Thomas M.; Li, Fenghua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Defending against the Advanced Persistent Threat: An Optimal Control Approach
By: Yang, Xiaofan; Wen, Junhao; Tang, Yuan Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
By: Luo, Ming; Luo, Yi; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
By: Paundu, Ady Wahyudi; Fall, Doudou; Mazurczyk, Wojciech…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
By: Melo, Wilson S.; Machado, Raphael C. S.; Carmo, Luiz F. R. C.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Quantum Cryptography for the Future Internet and the Security Analysis
By: Shen, Jian; Li, Xiong; Wang, Chen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy
By: Fu, Chong; Zhang, Gao-yuan; Zhang, Leo Y.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
NOSArmor: Building a Secure Network Operating System
By: Jo, Hyeonseong; Nam, Jaehyun; Shin, Seungwon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
By: Sija, Baraka D.; Kim, Myung-Sup; Liu, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
Validating User Flows to Protect Software Defined Network Environments
By: Abdulqadder, Ihsan H.; Deqing, Zou; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques
By: Chu, Zhihui; Dong, Xiaoyang; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework
By: Cha, ByungRae; Pan, Sung Bum; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
By: Dragoni, Nicola; Bugliesi, Michele; Spognardi, Angelo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-30, 30 p.
مقالات
Iris Template Protection Based on Local Ranking
By: Zhao, Dongdong; Fang, Shu; Xiong, Shengwu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
By: Chen, Xianyi; Zhong, Haidong; Cogranne, Rémi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
«
1
2
3
4
5
6
»