معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
601
-
650
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model
By: Zhang, Chunming; Xiao, Jingwei; Del Rey, Ángel Martín. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network
By: Wang, Yulong; Yi, Junjie; Guo, Jun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
مقالات
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization
By: Novikova, Evgenia; Shorov, Andrey; Gómez Mármol, Félix…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
By: Zhao, Yan; Li, Shiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services
By: Ma, Zhuo; Cao, Jiuxin; Yang, Laurence T.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Security Measurement for Unknown Threats Based on Attack Preferences
By: Guo, Yunchuan; Binxing, Fang; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
By: Wang, Chen; Shen, Jian; Ren, Yongjun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
مقالات
Efficient Compression and Encryption for Digital Data Transmission
By: Carpentieri, Bruno; Choo, Kim-Kwang Raymond. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence
By: Lee, Jong-Hwan; Joo, Jeung-Min; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
HAC: Hybrid Access Control for Online Social Networks
By: Li, Hui; Guo, Yunchuan; Niu, Ben…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency
By: Liu, Manhua; Liu, Shuxin; Yan, Weiwu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
By: Jaïdi, Faouzi; Labbene Ayachi, Faten; Bouhoula, Adel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-22, 22 p.
مقالات
An Efficient Certificateless Generalized Signcryption Scheme
By: Zhang, Bo; Jia, Zhongtian; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Data Fusion for Network Intrusion Detection: A Review
By: Yan, Zheng; Fu, Yulong; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
A Framework for Vulnerability Detection in European Train Control Railway Communications
By: Arsuaga, Irene; Toledo, Nerea; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
Energy-Aware Key Exchange for Securing Implantable Medical Devices
By: Choi, Wonsuk; Conti, Vincenzo; Lee, Dong Hoon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys
By: Wei, Songjie; Li, Shuai; Liu, Peilong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation
By: Danner, Gábor; Berta, Árpád; Lin, Po-Ching…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Uncovering Tor: An Examination of the Network Structure
By: Monk, Bryan; Mitchell, Julianna; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication
By: Safavi-Naini, Reihaneh; Poostindouz, Alireza; Okhravi, Hamed…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search
By: Wei, Xianglin; Fan, Jianhua; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack
By: Zhao, Yuntao; Feng, Yongxin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions
By: Wang, Yao; Cai, Wandong; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
An Approach for Internal Network Security Metric Based on Attack Probability
By: Shan, Chun; Jiang, Benfu; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Survey on Security-Aware Measurement in SDN
By: Cai, Z.; Liu, Qiang; Li, Yangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
A DDoS Attack Detection Method Based on SVM in Software Defined Network
By: Ye, Jin; Cheng, Xiangyang; Cai, Z.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments
By: Chen, Yun; Lv, Kun; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
LWR-Based Fully Homomorphic Encryption, Revisited
By: Li, Jie; Chen, Kefei; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN
By: Granjal, Jorge; Pedroso, Artur; Gómez Mármol, Félix. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Development of the ECAT Preprocessor with the Trust Communication Approach
By: Ovaz Akpinar, Kevser; Maglaras, Leandros A.; Ozcelik, Ibrahim. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
By: Chen, Yanan; Xiong, Hu; Xu, Weixiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
By: Zeng, Yongbin; Nicopolitidis, Petros; Li, Guang-song…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
By: He, Gaofeng; Kambourakis, Georgios; Zhu, Haiting…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
By: Choi, Hyunwoo; Lin, Po-Ching; Kim, Yongdae. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
مقالات
On the Complexity of Impossible Differential Cryptanalysis
By: Yang, Qianqian; Hu, Lei; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
By: Taleby Ahvanooey, Milad; Li, Qianmu; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-22, 22 p.
مقالات
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect
By: Gupta Banik, Barnali; Maiorana, Emanuele; Bandyopadhyay, Samir Kumar. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
مقالات
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
By: Wang, Chenyu; Xu, Guoai; Li, Shujun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things
By: Caminha, Jean; Perkusich, Angelo; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
Global Behavior of a Computer Virus Propagation Model on Multilayer Networks
By: Zhang, Chunming; Karyotis, Vasileios. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs
By: Wang, Hongyu; Xu, Jin; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers
By: Mahmood, Shahid; Farwa, Shabieh; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
مقالات
A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack
By: Jesus, Emanuel Ferreira; Chicarino, Vanessa R. L.; Gómez Mármol, Félix…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-27, 27 p.
مقالات
Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments
By: Park, So Ryoung; Nam, Ilku; Noh, Sanguk…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
By: Wang, An; Zhu, Liehuang; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
مقالات
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing
By: Zhu, Hongliang; Chen, Meiqi; Zhang, Xinpeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Analysis on Influential Functions in the Weighted Software Network
By: He, Haitao; Yan, Zheng; Guoyan, Huang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
A Novel Image Authentication with Tamper Localization and Self-Recovery in Encrypted Domain Based on Compressive Sensing
By: Zhang, Rui; Xiao, Di; Chang, Yanting…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks
By: Vu-Van, Hiep; Koo, Insoo; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Security and Privacy in the Medical Internet of Things: A Review
By: Sun, Wencheng; Cai, Z.; Li, Yangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
«
8
9
10
11
12
13
14
15
16
17
»