معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
501
-
550
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection
By: Xue, Yu; Pang, Wei; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment
By: Bo, Lili; Zhang, Xuyun; Jiang, Shujuan. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Differential Cryptanalysis on Block Cipher Skinny with MILP Program
By: Zhang, Pei; Pan, Zhaoqing; Zhang, Wenying. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups
By: Razaq, Abdul; Alolaiyan, Hanan; Riaz, Arshad…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Differentially Private Recommendation System Based on Community Detection in Social Network Applications
By: Cai, Zhipeng; Yin, Guisheng; He, Zaobo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption
By: Huang, Qinlong; Yang, Yixian; Wang, Wei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Towards a Novel Trust-Based Multicast Routing for VANETs
By: Xia, Hui; Zhang, San-shun; Hu, Chunqiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid
By: Tian, Jiwei; Wang, Buhong; Wei, Jin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems
By: Wang, Jinbao; Gao, Hong; Ma, Liran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes
By: Ji, Xiaoyu; Cheng, Yushi; Xu, Wenyuan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Deep Learning Hash for Wireless Multimedia Image Content Security
By: Zheng, Yu; Zhu, Jiezhong; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation
By: Choi, Dahee; Lee, Kyungho; You, Ilsun. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks
By: Xu, Xiaolong; Zhang, Jie; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor
By: Park, Taehwan; Seo, Hwajeong; Kim, Howon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
By: Lee, Hyang-Sook; Lim, Seongan; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm
By: Elwahsh, Haitham; Caballero-Gil, Pino; El-Henawy, Ibrahim M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
RoughDroid: Operative Scheme for Functional Android Malware Detection
By: Riad, Khaled; Qi, Lianyong; Ke, Lishan. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms
By: Yuan, Ye; Xiao, Junting; Lee, Mun-Kyu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication
By: Wan, Ming; Song, Yan; Jing, Yuan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Performance Analysis of Hyperledger Fabric Platforms
By: Nasir, Qassim; Nassif, Ali Bou; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Corrigendum to “A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks”
By: Şimşek, Mehmet. Security and Communication Networks. No. 2018 (2018), pp.1-2, 2 p.
مقالات
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
By: Zhang, Yinghui; Zheng, Dong; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Automatic Benchmark Generation Framework for Malware Detection
By: Shan, Zheng; Cilardo, Alessandro; Chen, Yihang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
By: Argyriou, Marios; Dragoni, Nicola; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds
By: Dai, Hua; Yang, Geng; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis
By: Swain, Gandharba; Qian, Zhenxing. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling
By: Seo, Jungwoo; Nicopolitidis, Petros; Lee, Sangjin. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
مقالات
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image
By: Zhang, Xianquan; Tang, Zhenjun; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
By: Lara-Nino, Carlos Andres; Diaz-Perez, Arturo; Morales-Sandoval, Miguel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark
By: Zhou, Yuanyuan; Yuan, Yuan; He, Qiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
By: Choo, Kim-Kwang Raymond; He, Debiao; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
HardwareSoftware Adaptive Cryptographic Acceleration for Big Data Processing
By: Xiao, Chunhua; Zhang, Lei; Zhou, Jun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
مقالات
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network
By: Yan, Binghao; Genge, Bela; Han, Guodong. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection
By: Hingant, Javier; Zambrano, Marcelo; Martínez Pérez, Gregorio…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
An Adaptive Audio Steganography for Covert Wireless Communication
By: Xin, Guojiang; Liu, Yuling; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation
By: Thanigaivelan, Nanda Kumar; Nigussie, Ethiopia; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Closer Look at Intrusion Detection System for Web Applications
By: Agarwal, Nancy; Conti, Vincenzo; Hussain, Syed Zeeshan. Security and Communication Networks. No. 2018 (2018), pp.1-27, 27 p.
مقالات
Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model
By: Li, Yang; Wang, Jian; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Improved Construction for Inner Product Functional Encryption
By: Zhao, Qingsong; Nicopolitidis, Petros; Liu, Ximeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution
By: Li, Ming; Zhang, En; Sun, Lin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection
By: Zhang, Zhaohui; Pan, Zhaoqing; Wang, Pengwei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms
By: Mohammadrezaei, Mohammadreza; Shiri, Mohammad Ebrahim; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis
By: Hu, Hao; Zhang, Hongqi; Zhang, Yuchen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
High Embedding Capacity Data Hiding Algorithm for H.264AVC Video Sequences without Intraframe Distortion Drift
By: Nguyen, Dinh-Chien; Nguyen, Thai-Son; Chang, Chin-Chen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
By: An, Xingshuo; Lin, Fuhong; Xu, Shenggang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Deep Learning Approaches for Predictive Masquerade Detection
By: Elmasry, Wisam; Akbulut, Akhan; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
مقالات
WS 3 N: Wireless Secure SDN-Based Communication for Sensor Networks
By: Pereira, Geovandro C. C. F.; Albertini, Bruno C.; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Bootstrapping of FHE over the Integers with Large Message Space
By: Lian, Zhizhu; Hu, Yupu; Wang, Baocang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications
By: Carvajal-Gámez, Blanca Esther; Maglaras, Leandros A.; Diaz-Casco, Manuel Alejandro. Security and Communication Networks. No. 2018 (2018), pp.1-29, 29 p.
مقالات
Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme
By: Bai, Shuangjie; Yang, Geng; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
«
6
7
8
9
10
11
12
13
14
15
»