معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
701
-
750
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Analysis of Iterative Erasure Insertion and Decoding of FHMFSK Systems without Channel State Information
By: Park, Jinsoo; Kim, Gangsan; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
Security Analysis of Dynamic SDN Architectures Based on Game Theory
By: Qi, Chao; Wu, Jiangxing; Cai, Z.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
مقالات
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
By: Liu, Anfeng; Zhao, Ming; Wang, Tian…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-30, 30 p.
مقالات
Nonoverlapping Blocks Based Copy-Move Forgery Detection
By: Sun, Yu; Ni, Rongrong; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Perceptual Hashing-Based Image Copy-Move Forgery Detection
By: Wang, Huan; Wang, Hongxia; Qian, Zhenxing. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
مقالات
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster
By: Lee, Yongjae; Lee, Seunghyeon; Seo, Hyunmin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Distance Measurement Methods for Improved Insider Threat Detection
By: Lo, Owen; Buchanan, William J.; Pelosi, Gerardo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
FAS: Using FPGA to Accelerate and Secure SDN Software Switches
By: Fu, Wenwen; Li, Tao; Hu, Chengchen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
مقالات
Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach
By: Zhao, Min; Xing, Yan; Wang, Qionghua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems
By: Niu, Xiaoguang; Wang, Jiawei; Szczypiorski, Krzysztof…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
DNS Tunneling Detection Method Based on Multilabel Support Vector Machine
By: Almusawi, Ahmed; Di Pietro, Roberto; Amintoosi, Haleh. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
مقالات
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction
By: Wang, Tao; Chen, Hongchang; Fu, Qiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
مقالات
Kuijia: Traffic Rescaling in Software-Defined Data Center WANs
By: Zhang, Che; Xu, Hong; Liu, Libin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
مقالات
LSTM-Based Hierarchical Denoising Network for Android Malware Detection
By: Yan, Jinpei; Qi, Yong; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
مقالات
Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense
By: Zhou, Yadong; Chen, Kaiyue; Cai, Z.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
A Wireless Covert Channel Based on Constellation Shaping Modulation
By: Cao, Pengcheng; Liu, Weiwei; Cogranne, Rémi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
By: Chiou, Shin-Yan; Maiorana, Emanuele; Lin, Ching-Hsuan. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
مقالات
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data
By: Liu, Zhen; Meng, Huanyu; Cai, Z.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
By: Zhang, Ru; Huo, Yanyu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
By: Meng, Qian; Ma, Jianfeng; Chen, Kefei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
By: Zheng, Kangfeng; Yang, Yixian; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
A Survey on Breaking Technique of Text-Based CAPTCHA
By: Luo, Xiangyang; Gong, Daofu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature
By: Chiou, Shin-Yan; Wang, Tsung-Ju; Chen, Jiun-Ming…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
By: Chen, Hao; Wang, Tao; Park, Namje…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark
By: Guo, Xing; Zhang, Yiwen; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
By: Liu, Yi; Zhang, Hongqi; Han, Guangjie…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process
By: Yin, Ke; Conti, Vincenzo. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing
By: Li, Ji; Wei, Jianghong; Hu, Xuexian…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
By: Liu, Keyang; Zhang, Weiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
By: Han, Shuai; Liu, Shengli; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-27, 27 p.
مقالات
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation
By: Xia, Xiaona; Yu, Jiguo; Liu, Chang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Detecting Web-Based Botnets Using Bot Communication Traffic Features
By: Hsu, Fu-Hau; Ou, Chih-Wen; Hwang, Yan-Ling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG
By: Madani, Mahdi; Tanougast, Camel; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
By: Zhang, Hua; Wen, Qiaoyan; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Multiuser Searchable Encryption with Token Freshness Verification
By: Sharma, Dhruti; Jinwala, Devesh C.; Zeadally, Sherali. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks
By: Li, Feng; Si, Yali; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
By: Iturbe, Mikel; Zurutuza, Urko; Uribeetxeberria, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Protecting Private Data by Honey Encryption
By: Yin, Wei; Indulska, Jadwiga; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
By: Li, Tong; Zheng, Yuhui; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
By: Yang, Wenjie; Weng, Jian; Luo, Weiqi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map
By: Razaq, Abdul; Yousaf, Awais; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders
By: Yu, Yang; Cai, Z.; Mazurczyk, Wojciech…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
By: Liu, Yujia; Yu, Nenghai; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
An Edge Correlation Based Differentially Private Network Data Release Method
By: Lu, Junling; Zhang, Lichen; Song, Houbing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine
By: Wang, Ming-Hung; Lei, Chin-Laung; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
A Multidomain Survivable Virtual Network Mapping Algorithm
By: Xiao, Xiancui; Zheng, Xiangwei; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
By: Sharma, Vishal; Lee, Kyungroul; Gómez-Skarmeta, Antonio F.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-24, 24 p.
مقالات
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments
By: Rong, Hong; Wang, Huimei; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining
By: Li, Shuo; Wei, Jianguo; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks
By: Hu, Donghui; Shen, Qiang; Zhou, Shengnan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
«
9
10
11
12
13
14
15
16
17
18
»