معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
1
-
50
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Improving Topic-Based Data Exchanges among IoT Devices
By: Liu, Peng; Zhu, Jianming; Zhang, Yanmei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
A Novel Comprehensive Watermarking Scheme for Color Images
By: Duan, Shaohua; Wang, Hanwen; Zhou, Nanrun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope
By: Zhao, Xiaolin; Peng, Hui; Li, Yue…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX
By: Nuño, Pelayo; Suárez, Carla; Lombardi, Flavio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing
By: Tang, Yongli; Zhao, Mingjie; Li, Lixiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Enabling Sector Scheduling for 5G-CPE Dense Networks
By: Jin, Tong; Tian, Liwei; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing
By: Guo, Jingjing; Gope, Prosanta; Sun, Jiacong. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Secrecy Performance Analysis of the NOMA System on High-Speed Railway
By: Yang, Jinxia; Peng, Xin; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
مقالات
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks
By: Yu, Qingying; Sun, Liping; Li, Xuejing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
By: Liu, Zhe; Liang, Kaitai; Tang, Fei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
By: Zhang, Kai; Li, Yanping; Vasilakos, Athanasios V.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Erratum to “Incremental Learning for Malware Classification in Small Datasets”
By: Xue, Di; Li, Jingmei; Wu, Weifei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-1, 1 p.
مقالات
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs
By: Zhang, Dengyong; Chen, Xiao; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles
By: Tao, Fazhan; Ji, Baofeng; Li, Xingwang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
Detecting Web Spam Based on Novel Features from Web Page Source Code
By: Liu, Jiayong; Su, Yu; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
A Movie Recommendation System Based on Differential Privacy Protection
By: Li, Min; Zeng, Yingming; Peng, Hao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing
By: Yang, Guosheng; Gao, Honghao; Wei, Qisheng. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Cryptosystem Identification Scheme Based on ASCII Code Statistics
By: Zhang, Wenyu; Zhao, Yaqun; Del Rey, Angel M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
An Android Malware Detection Model Based on DT-SVM
By: Chen, Xingshu; Zhang, Hang; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks
By: Jia, Nan; Fu, Shaojing; You, Ilsun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis
By: Xu, Yang; Fu, Zixi; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
A Key Business Node Identification Model for Internet of Things Security
By: Xie, Lixia; Ni, Huiyu; Yang, Hongyu…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
By: Huang, Xinyu; Tian, Yunzhe; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
A Secure and Effective Construction Scheme for Blockchain Networks
By: Shen, Yan; Li, Tao; Zhang, Zhen…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
مقالات
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology
By: Yu, Jia; Gao, Xue; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
A Privacy-Protection Model for Patients
By: Yin, Xiangdong; Liu, Chunyan; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT
By: Zhao, Chenglin; Zhang, Zeyu; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
مقالات
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures
By: Wang, Zhenxing; Ma, Yong; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
By: Kim, Daegeon; Gu, Do Hyung; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
By: Zhao, Shengnan; Song, Xiangfu; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Binary File’s Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification
By: Guo, Hui; Huang, Cheng; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
مقالات
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things
By: Wu, Yixin; Zhang, Xing; Chen, Ting…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid
By: Zhou, Yousheng; Chen, Xinyun; Yang, Luxing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
An Unequal Image Privacy Protection Method Based on Saliency Detection
By: Tu, Rongxin; Wen, Wenying; Ye, Guodong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection
By: Hua, Qingyi; Zhang, Jing; Fang, Dingyi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing
By: Chen, Rongrong; Peng, Ziran; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature
By: Meng, Yitong; Liu, Zhe-Li; Fei, Jinlong. Security and Communication Networks. No. 2020 (2020), pp.1-21, 21 p.
مقالات
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs
By: Aguilar Santiago, Jorge; Flores Siordia, Octavio; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-22, 22 p.
مقالات
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model
By: Ke, Qiao; Liu, Yang; Wei, Wei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques
By: Xia, Qi; Zhang, Xiaosong; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications
By: El Hadj Youssef, Wajih; Abdelli, Ali; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Modelling the Mimic Defence Technology for Multimedia Cloud Servers
By: Feng, Feng; Zhou, Xia-Bing; Zhou, Qing-Lei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-22, 22 p.
مقالات
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things
By: Yang, Hongyu; Xu, Guangquan; Li, Wenjuan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network
By: Noh, Siwan; Shin, Sang Uk; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
By: Maryam, Afifa; Ahmed, Usman; Iqbal, Muhammad Azhar…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System
By: Huang, Huiqing; Bai, Sen; Cheng, Dongsheng. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
By: Zhang, Shibin; Chang, Yan; Chen, Ting…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
SANS: Self-Sovereign Authentication for Network Slices
By: Salleras, Xavier; Daza, Vanesa; Fang, Liming. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
On the Value of Order Number and Power in Secret Image Sharing
By: Yu, Yongqiang; Li, Longlong; Lu, Yuliang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
By: Aslan, Bora; Yavuzer Aslan, Füsun; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
«
1
2
3
4
5
6
7
8
9
10
»