معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
551
-
600
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Trust Management in Collaborative Systems for Critical Infrastructure Protection
By: Ait Aali, Nawal; Baina, Amine; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks
By: Zare-Garizy, Tirazheh; Fridgen, Gilbert; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Moving Target Defense Techniques: A Survey
By: Lei, Cheng; Tan, Jinglei; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-25, 25 p.
مقالات
A Security Sandbox Approach of Android Based on Hook Mechanism
By: Jiang, Xin; Liu, Mingzhe; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
Street-Level Landmark Evaluation Based on Nearest Routers
By: Li, Ruixiang; Qi, Lianyong; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties
By: Zhu, Liehuang; Li, Meng; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
By: Park, Won; Lee, Kyungho; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization
By: Chang, Chin-Chen; Mao, Xiaoyang; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Efficient Isogeny Computations on Twisted Edwards Curves
By: Kim, Suhri; Hong, Seokhie; Lee, Mun-Kyu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting
By: Rondeau, Christopher M.; Temple, Michael A.; Genge, Bela…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Design and Analysis of Push Notification-Based Malware on Android
By: Hyun, Sangwon; Palmieri, Francesco; Kim, Hyoungshick…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Secure and Efficient Image Retrieval over Encrypted Cloud Data
By: Liang, Haihua; Zhang, Xinpeng; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency
By: Park, Youngho; You, Ilsun; Rhee, Kyung-Hyune…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Android Malware Characterization Using Metadata and Machine Learning Techniques
By: Martín, Ignacio; Hernández, José Alberto; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
By: Long, Jun; Liu, Qiang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
By: Seo, Seog Chung; Li, Huaizhi; Youn, Taek-Young. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
By: Yang, Geng; Xiang, Yang; Dai, Hua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Security Evaluation Framework for Military IoT Devices
By: Baek, Seungsoo; Kim, Seungjoo; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Network Programming and Probabilistic Sketching for Securing the Data Plane
By: Chehab, Ali; Di Pietro, Roberto; Kayssi, Ayman…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-23, 23 p.
مقالات
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map
By: Anees, Amir; Hussain, Iqtadar; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
مقالات
Session Fingerprinting in Android via Web-to-App Intercommunication
By: Alepis, Efthimios; Wang, Guojun; Patsakis, Constantinos. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Blockchain Based Credibility Verification Method for IoT Entities
By: Qu, Chao; Tao, Ming; Wang, Wei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme
By: Liu, Ying-Ying; Conti, Vincenzo; Chu, Yun-kai. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience
By: Zhang, Yinghui; Zheng, Dong; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Winternitz Signature Scheme Using Nonadjacent Forms
By: Roh, Dongyoung; Jung, Sangim; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
By: Hu, Jiankun; Alazab, Mamoun; Ma, Jixin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(2m) Based on Montgomery Arithmetic
By: Schramm, Martin; Dojen, Reiner; Ahmed, Fawad…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
By: Jung, Jaewook; Lee, Youngsook; Won, Dongho…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis
By: Liu, Zhenyan; Zeng, Yifei; Xue, Jingfeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework
By: Shim, Jaewoo; Park, Minkyu; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
By: Wang, Gicheol; Cho, Gihwan; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
By: Li, Tong; You, Ilsun; Yan, Hongyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-6, 6 p.
مقالات
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things
By: Shi, Lianmin; Wang, Yihuai; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment
By: Xu, Zhiyan; He, Debiao; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
An Effective Classification Approach for Big Data Security Based on GMPLSMPLS Networks
By: Alouneh, Sahel; Ghinea, George; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Survey of Authentication and Authorization for the Internet of Things
By: Trnka, Michal; Cerny, Tomas; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
By: Barrowclough, John Patrick; Zeadally, Sherali; Asif, Rameez. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
مقالات
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures
By: Song, Yurong; Yang, Lu-Xing; Jiang, Guo-Ping…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks
By: Du, Yi-Hong; Liu, Shihua; Del Rey, Ángel Martín. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks
By: El Ksimi, Ali; Li, Wenjia; Leghris, Cherkaoui. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
By: Xie, Run; Zhang, Xiao Jun; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things
By: Xu, Jun; Zhang, Xiong; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism
By: Yuan, Ye; Wu, Liji; Mujahid, Umar…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest
By: Idhammad, Mohamed; Afdel, Karim; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
By: Wagner, Thomas D.; Palomar, Esther; Mahbub, Khaled…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique
By: Wang, Guojun; Zhang, Yaoxue; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures
By: Su, Xin; Choi, Chang; Choi, Dongmin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Demadroid: Object Reference Graph-Based Malware Detection in Android
By: Wang, Huanran; He, Hui; Zhang, Weizhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries
By: Wang, Xiajing; Ma, Rui; Choo, Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking
By: Zhu, Qingyi; Loke, Seng W.; Karyotis, Vasileios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
«
7
8
9
10
11
12
13
14
15
16
»