معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
51
-
100
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving
By: Wang, Yaojie; Cui, Xiaolong; Gao, Zhiqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism
By: Jiang, Lurong; Xu, Qiaoyu; Alcaraz, Cristina…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Community Detection Based on DeepWalk Model in Large-Scale Networks
By: Chen, Yunfang; Wang, Li; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
By: Zhou, Jie; Bai, Jian; Valenza, Fulvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology
By: Memon, Imran; Haq, Amin Ul; Shaukat, Sajjad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
BNRDT: When Data Transmission Meets Blockchain
By: Jin, Hongjian; Guo, Hui; Gan, Chenquan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
A Prediction Approach for Video Hits in Mobile Edge Computing Environment
By: Liu, Xiulei; Hou, Shoulu; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
مقالات
AKC-Based Revocable ABE Schemes from LWE Assumption
By: Cheng, Leixiao; Meng, Fei; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
PowerPrint: Identifying Smartphones through Power Consumption of the Battery
By: Chen, Jiong; Chen, Jing; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes
By: Zhang, Bowen; Tondi, Benedetta; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes
By: Gong, Yonghua; Ma, Tinghuai; Sheng, Victor S.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Methods to Measure the Network Path Connectivity
By: Jiang, Guo-Ping; Wu, Meng; Zhu, Qingyi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection
By: Han, Zhike; Wu, Xiuchao; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint
By: Zhang, Jianbing; Ma, Bowen; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks
By: Tian, Miaoqing; Lu, Qian; Zhou, Xiaoyun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol
By: Han, Yi Liang; Li, Yu; Anees, Amir…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Mimic Encryption Box for Network Multimedia Data Security
By: Zhou, Xiabing; Li, Bin; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-24, 24 p.
مقالات
Lattice-Based Linearly Homomorphic Signature Scheme over F2
By: Wang, Hao; Xu, Qiuliang; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
مقالات
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection
By: Jeng, Tzung-Han; Chen, Yi-Ming; Afzal, Hammad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
مقالات
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function
By: Hong, Deukjo; Nicopolitidis, Petros. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
An Improved Blockchain-Based Authentication Protocol for IoT Network Management
By: Yavari, Mostafa; He, Debiao; Chen, Chien-Ming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game
By: Liu, Xiaohu; Zhang, Yuchen; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Automatic Analysis Architecture of IoT Malware Samples
By: Carrillo-Mondejar, Javier; Castelo Gomez, Juan Manuel; Zhang, Yin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
A Mean Convolutional Layer for Intrusion Detection System
By: Mohammadpour, Leila; Ling, T.C.; Chen, Tom…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
High-Performance Routing Emulation Technologies Based on a Cloud Platform
By: Chen, Jianyu; Wang, Xiaofeng; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
Research on Selection Method of Privacy Parameter ε
By: Sun, Pan Jun; Conti, Vincenzo. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
By: Lv, Na; Chen, Tianyu; Lin, Jingqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-1, 1 p.
مقالات
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment
By: Math, Sa; Zhang, Lejun; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack
By: Zhang, Yuchen; Liu, Xiaohu; Genge, Bela…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys
By: Hu, Xiaoyan; Jin, Liang; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage
By: Wang, Yaowei; Chen, Chen; Liu, Ximeng…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security
By: Zhang, Xi; Su, Ye; Peinado, A.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks
By: Wei, Guofeng; Zhang, Bangning; Li, Xingwang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks
By: Tang, Fei; Huang, Dong; Zhang, Chunming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
By: Zahednejad, Behnam; Li, Jing; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions
By: Wang, Juan; Yan, Xiaoyong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Improved Single-Key Attacks on 2-GOST
By: Zheng, Qiuhua; Wu, Ting; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ
By: Li, Hong; Pan, Gang; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
By: Yao, Shimao; Sankar, Ravi; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems
By: Gong, Yuhuan; Xu, Xiaolong; Mo, Yuchang. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Comprehensive Survey on Local Differential Privacy
By: Li, Dan; Cai, Zhaohui; Niu, Xiaoguang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-29, 29 p.
مقالات
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques
By: Shen, Zhidong; Chen, Si; Coppolino, Luigi. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory
By: Jiang, Rong; Zhou, Wei; Liu, Sen…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism
By: Ma, Xin; Li, Haiying; Chen, Ming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers
By: Shaukat Jamal, Sajjad; Shah, Dawood; Shah, Tariq…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Rational Protocols and Attacks in Blockchain System
By: Li, Tao; Wang, Yilei; Yang, Yixian…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Lightweight Crypto Stack for TPMS Using Lesamnta-LW
By: Watanabe, Yuhei; Yamamoto, Hideki; Mostarda, Leonardo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device
By: Zhao, Shijun; Feng, Wei; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone
By: Wang, Ziwang; Zhuang, Yi; Yan, Zujia…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
A Novel IM Sync Message-Based Cross-Device Tracking
By: Luo, Junzhou; Yang, Ming; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
«
1
2
3
4
5
6
7
8
9
10
»