معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
101
-
150
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Feature Selection Based on Cross-Correlation for the Intrusion Detection System
By: Farahani, Gholamreza; Mostarda, Leonardo. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder
By: Wei, Qiang; Wang, Hu; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
By: Adnan, Muhammad; Nazir, Shah; Anees, Amir…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities
By: Zhang, Xulong; Zhu, Qingyi; Song, Xiaoxia. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
مقالات
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries
By: Sancho, Jorge; García, José; Maglaras, Leandros…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment
By: Liu, Anqi; Yang, Maobin; Zhang, Chunming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels
By: Sun, Jiangfeng; He, Pengfei; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Impossible Differential Distinguishers of Two Generalized Feistel Structures
By: Ma, Wenping; Yang, Luxing; Zheng, Linfeng…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks
By: Zou, Ying; Wang, Lei; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Private Function Evaluation Using Intel’s SGX
By: Selo, Omar Abou; Rachid, Maan Haj; Malluhi, Qutaibah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA
By: Si, Xueming; Yuan, Chao; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey
By: Xu, Zhanyang; Liu, Wentao; Wanchun, Dou…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview
By: Nazir, Shah; Anees, Amir; Alharbi, Abdullah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Practical CCA-Secure Functional Encryptions for Deterministic Functions
By: Wang, Huige; Chen, Kefei; Liang, Kaitai…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment
By: Jiang, Jielin; Tian, Yuan; Al-Nabhan, Najla…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy
By: Shan, Nanliang; Ye, Zecong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
On WPA2-Enterprise Privacy in High Education and Science
By: Perković, T.; Dagelić, A.; Bugarić, M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Game Theoretical Method for Anomaly-Based Intrusion Detection
By: Xu, Guoai; Zhang, Miao; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising
By: Li, Tenghui; Zhuang, Yi; Dong, Shoubin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
An Improved Elman Network for Stock Price Prediction Service
By: Liu, Bo; Wu, Qilin; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
An Antiforensic Method against AMR Compression Detection
By: Li, Xiaowen; Dong, Li; Wang, Rangding…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
Enhancing Transaction Security for Handling Accountability in Electronic Health Records
By: Techapanupreed, Chian; Nicopolitidis, Petros; Kurutach, Werasak. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
By: Huang, Qinglong; Xiao, Fu; Wang, Wenming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
Efficient Private Set Intersection Using Point-Value Polynomial Representation
By: Ruan, Ou; Del Rey, Angel M.; Mao, Hao. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Secure Framework Enhancing AES Algorithm in Cloud Computing
By: Shiraz, Muhammad; Akhtar, Rizwan; Ditta, Allah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Characterizing Anomalies in Malware-Generated HTTP Traffic
By: Białczak, Piotr; Mazurczyk, Wojciech; Galdi, Clemente. Security and Communication Networks. No. 2020 (2020), pp.1-26, 26 p.
مقالات
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method
By: Huang, Xucheng; Anees, Amir; Nazir, Shah. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing
By: Tong, Xiangrong; Zhao, Jindong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System
By: Sun, Pengfei; Li, Qi; Wu, Huaming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing
By: Wu, Jianguo; Cheng, Yongliang; Liu, Zhiqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey
By: Wu, Yirui; Wei, Dabao; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
Android Malware Detection Based on a Hybrid Deep Learning Model
By: Lu, Tianliang; Du, Yanhui; Khokhar, Umar M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Certificateless Noninteractive Key Exchange Protocol with Provable Security
By: Cao, Xuefei; You, Wei; Liang, Kaitai…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication
By: Hong, Cheng; Anees, Amir; Khan, Sulaiman…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic
By: Di Martino, Mariano; Quax, Peter; Lamotte, Wim…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
By: Shin, Youngjoo; Hur, Junbeom; Koo, Dongyoung…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation
By: Li, Li; Liu, Jiayong; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing
By: Cao, Xuefei; Xu, Xiaolong; Chen, Bo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment
By: Wang, Gaocai; Yu, Ning; Maglaras, Leandros. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network
By: Guo, Junyan; Du, Ye; Del Rey, Angel M.. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
The Defense of Adversarial Example with Conditional Generative Adversarial Networks
By: Yu, Fangchao; Wang, Li; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
By: Truong, Toan-Thinh; Tran, Minh-Triet; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-21, 21 p.
مقالات
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
By: Sun, Pan Jun; Maglaras, Leandros. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems
By: Jiang, Jielin; Zhang, Xing; Wanchun, Dou…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning
By: El Kamel, Nadiya; Touahni, Raja; Shaukat, Sajjad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes
By: Liu, Yuan; Shen, Xiaoying; Li, Lixiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Limiting Privacy Breaches in Average-Distance Query
By: Xia, Huihua; Xiong, Yan; Aziz, Benjamin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-24, 24 p.
مقالات
A Survey of Key Technologies for Constructing Network Covert Channel
By: Xiong, Gang; Li, Zhen; Mostarda, Leonardo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
مقالات
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks
By: Almaslukh, Bandar; Amjad, Muhammad Faisal. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations
By: Yu, Jinghua; Abdelwahed, Sherif; Luo, Feng. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
«
1
2
3
4
5
6
7
8
9
10
»