معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
751
-
800
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds
By: Xu, Xiaolong; Zhao, Xuan; Dou, Wanchun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints
By: Kuang, Li; Wang, Yin; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks
By: Kamarudin, Muhammad Hilmi; Maple, Carsten; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
مقالات
Corrigendum to “Research on a New Signature Scheme on Blockchain”
By: Yuan, Chao; Xu, Mi-xue; Si, Xue-ming. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
مقالات
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
By: Chung, Tae Sun; Rizvi, Sanam Shahla; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Authentication Protocols for Internet of Things: A Comprehensive Survey
By: Maglaras, Leandros A.; Jiang, Jianmin; Shu, Lei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-41, 41 p.
مقالات
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment
By: Mao, Jian; Liu, Jianwei; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Remotely Exploiting AT Command Attacks on ZigBee Networks
By: Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
By: Zhang, Guoyin; Kou, Liang; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Android Rooting: An Arms Race between Evasion and Detection
By: Nguyen-Vu, Long; Chau, Ngoc-Tu; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing
By: Andrysiak, Tomasz; Saganowski, Łukasz; Kiedrowski, Piotr…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Privacy-Preserving Biometric Authentication: Challenges and Directions
By: Pagnin, Elena; Mitrokotsa, Aikaterini; Wang, Ding. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks
By: Khasawneh, Mahmoud; Agarwal, Anjali; Antonopoulos, Angelos. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups
By: Zhang, Jie; Ma, Chuangui; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
By: Zhang, Huanguo; Hu, Jiankun; Shi, Yuan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection
By: Kozik, Rafał; Garcia-Teodoro, P.; Choraś, Michał. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Segmentation Based Video Steganalysis to Detect Motion Vector Modification
By: Wang, Peipei; Cao, Yun; Zhao, Xianfeng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
CHAOS: An SDN-Based Moving Target Defense System
By: Hu, Hongxin; Cai, Z.; Zhao, Bo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
By: Zhou, Guomin; Yuan, Xiaohui; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
مقالات
Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability
By: Ren, Yanli; Dong, Min; Niu, Zhihua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks
By: García-Magariño, Iván; Lacuesta, Raquel; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Low-Rate DDoS Attack Detection Using Expectation of Packet Size
By: Zhou, Lu; Yuan, C.; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Fault Attack on the Authenticated Cipher ACORN v2
By: Zhang, Xiaojuan; Antonopoulos, Angelos; Lin, Dongdai…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy
By: Helil, Nurmamat; Rahman, Kaysar; Li, Huaizhi. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
How to Share Secret Efficiently over Networks
By: Harn, Lein; Hsu, Chingfang; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-6, 6 p.
مقالات
Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
By: Moon, Jongho; Lee, Youngsook; Won, Dongho…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching
By: Moia, Vitor Hugo Galhardo; Henriques, Marco Aurélio Amaral; Ribeiro, Bernardete. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
مقالات
Authenticated Location-Aware PublishSubscribe Services in Untrusted Outsourced Environments
By: Yan, Han; Cheng, Xiang; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Deniable Key Establishment Resistance against eKCI Attacks
By: Krzywiecki, Łukasz; Conti, Vincenzo; Wlisłocki, Tomasz. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
The Concept Drift Problem in Android Malware Detection and Its Solution
By: Hu, Donghui; Ma, Zhongjin; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration
By: Dong, Jiankuo; Zheng, Fangyu; Pan, Wuqiong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Relay Selections for Security and Reliability in Mobile Communication Networks over Nakagami-m Fading Channels
By: Huang, Hongji; Sun, Wanyou; Han, Guangjie…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
مقالات
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity
By: Han, Gang; Zheng, Dong; Garcia-Teodoro, P.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking
By: Ma, Rong; Cao, Zhenfu; Challal, Yacine…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4
By: Liu, Yu; Liang, Huicong; Wang, Wei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
A Novel Design of Membership Authentication and Group Key Establishment Protocol
By: Harn, Lein; Hsu, Chingfang; Del Rey, Ángel Martín. Security and Communication Networks. No. 2017 (2017), pp.1-7, 7 p.
مقالات
Improvements for Finding Impossible Differentials of Block Cipher Structures
By: Luo, Yiyuan; Díaz-Verdejo, Jesús; Lai, Xuejia. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
مقالات
Efficient Secure Multiparty Subset Computation
By: Zhou, Sufang; Li, Shundong; Liu, Xin…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
مقالات
Mlifdect: Android Malware Detection Based on Parallel Machine Learning and Information Fusion
By: Zhang, Dafang; Su, Xin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
مقالات
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems
By: Pereira, Geovandro C. C. F.; Alves, Renan C. A.; Silva, Felipe L. da…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
مقالات
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems
By: Shen, Jiajun; Antonopoulos, Angelos; Feng, Dongqin. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
مقالات
Locality-Based Visual Outlier Detection Algorithm for Time Series
By: Li, Zhihua; Li, Ziyuan; Yu, Ning…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments
By: Khan, Muhammad Khurram; Kumari, Saru; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
مقالات
Research on a New Signature Scheme on Blockchain
By: Yuan, Chao; Xu, Mi-xue; Du, Xiaojiang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems
By: Wang, Jingxuan; Hui, Lucas C. K.; Yiu, Siu-Ming…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
By: Asif, Rameez; Martin, Vincente; Buchanan, William J.. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
مقالات
Location Privacy Leakage through Sensory Data
By: Liang, Yi; Yang, Qing; Li, Yingshu…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model
By: Ouyang, Chunjuan; Leng, Ming; Liu, Huan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
مقالات
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities
By: Wang, Licheng; Yang, Yixian; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
مقالات
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
By: Zhou, Caixue; Zhao, Zhiqiang; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
«
9
10
11
12
13
14
15
16
17
18
»