معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
201
-
250
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
User Authentication Method Based on MKL for Keystroke and Mouse Behavioral Feature Fusion
By: Wang, Xiujuan; Wu, Tong; Perez, Gregorio Martinez…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Group Recommender Systems Based on Members’ Preference for Trusted Social Networks
By: Wang, Xiangshi; Su, Lei; Zhang, Yin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Cryptographic Strength Evaluation of Key Schedule Algorithms
By: Afzal, Shazia; Yousaf, Muhammad; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
By: Ganesh, S. Milton; Alcaraz, Cristina; Manikandan, S. P.. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Exploiting the Relationship between Pruning Ratio and Compression Effect for Neural Network Model Based on TensorFlow
By: Liu, Bo; Zhang, Yiwen; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
Extension of Research on Security as a Service for VMs in IaaS Platform
By: Yin, Xueyuan; Chen, Xingshu; Milutinovic, Veljko…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Combat Mobile Evasive Malware via Skip-Gram-Based Malware Detection
By: Egitmen, Alper; Bulut, Irfan; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Erratum to “An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks”
By: Hayajneh, Thaier; Doomun, Razvi; Almashaqbeh, Ghada…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-1, 1 p.
مقالات
Protection of Sensitive Data in Industrial Internet Based on Three-Layer LocalFogCloud Storage
By: Liu, Jing; Yuan, Changbo; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Efficient Hierarchical Authentication Protocol for Multiserver Architecture
By: Kou, Jiangheng; He, Mingxing; de Fuentes, Jose Maria…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism
By: Xiao, Shenyong; Yu, ZhiJun; Deng, YaShuang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
A CP-ABE Scheme Supporting Arithmetic Span Programs
By: Ma, Chao; Gao, Haiying; Kapron, Bruce M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
مقالات
Integrating Security Requirements Engineering into MBSE: Profile and Guidelines
By: Mažeika, D.; Sorce, Salvatore; Butleris, Rimantas. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption
By: Zhang, Ping; Visconti, Andrea; Yuan, Qian. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
مقالات
User Audit Model Based on Attribute Measurement and Similarity Measurement
By: Yang, Xiaohui; Thamilarasu, Geethapriya; Sun, Ying. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing
By: Ping, Yuan; Wang, Baocang; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
On the Unlinkability of Fingerprint Shell
By: Lee, Sanghoon; Hu, Jiankun; Jeong, Ik Rae. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
مقالات
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE
By: Moon, Subin; Milutinovic, Veljko; Lee, Younho. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
Using a Subtractive Center Behavioral Model to Detect Malware
By: Aslan, Ömer; Samet, Refik; Tanrıöver, Ömer Özgür…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System
By: Shahzadi, Shumaila; Khaliq, Bushra; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things
By: Tang, Kun; Tang, Wenjuan; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization
By: Bihl, Trevor J.; Paciencia, Todd J.; Bauer, Kenneth W.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Cycle-Consistent Adversarial GAN: The Integration of Adversarial Attack and Defense
By: Wang, Linyuan; Bu, Haibing; Yan, Bin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Botnet Forensic Analysis Using Machine Learning
By: Bijalwan, Anchit; Li, Huaizhi. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Incremental Learning for Malware Classification in Small Datasets
By: Li, Jingmei; Xue, Di; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks against Two Objective Functions Using a Novel Dataset
By: Foley, John; Moradpoor, Naghmeh; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
مقالات
Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks
By: Mo, Jiaqing; Hu, Zhongwang; Lin, Yuhua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models
By: Eom, Taehoon; Park, Jong Sou; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators
By: Lv, Na; Chen, Tianyu; Lin, Jingqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption
By: Kim, Taeyun; Oh, Yongwoo; de Fuentes, Jose Maria…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs
By: He, Debiao; Kumar, Neeraj; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Server-Aided Revocable Attribute-Based Encryption from Lattices
By: Dong, Xingting; Wang, Baocang; Kapron, Bruce M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System
By: Zhou, Xingguang; Liu, Jianwei; Sha, Kewei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
مقالات
MHCOOS: An Offline-Online Certificateless Signature Scheme for M-Health Devices
By: Hou, Jun; Li, Qianmu; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
مقالات
Identity-Based Public Auditing Scheme for Cloud Storage with Strong Key-Exposure Resilience
By: Nithya, S. Mary Virgil; Uthariaraj, Rhymend; Megias, David. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
مقالات
A Stacking Ensemble for Network Intrusion Detection Using Heterogeneous Datasets
By: Rajagopal, Smitha; Kundapur, Poornima Panduranga; Hareesha, Katiganere Siddaramappa…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
Jamming Prediction for Radar Signals Using Machine Learning Methods
By: Lee, Gyeong-Hoon; Jo, Jeil; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
مقالات
A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
By: Dai, Hua; Xiao, Fu; Yang, Geng…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Protecting Metadata of Access Indicator and Region of Interests for Image Files
By: Kim, JeongYeon; Soundrapandiyan, Rajkumar. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
مقالات
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64
By: Huang, Mingjiang; Wang, Li-ming; Megias, David. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
مقالات
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel
By: Pan, Jiaye; Zhuang, Yi; Sun, Binglin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
مقالات
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices
By: Weng, Jian; Wen, Jinming; Kapron, Bruce M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
مقالات
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots
By: Xue, Mingfu; Wang, Jian; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
مقالات
Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking
By: Zhu, Xianwei; Chang, Chaowen; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
مقالات
Compact Implementations of HIGHT Block Cipher on IoT Platforms
By: Kim, Bohun; Nicopolitidis, Petros; Seo, Hwajeong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
A Novel Framework to Classify Malware in MIPS Architecture-Based IoT Devices
By: Phu, Tran Nghi; Ngo, Quoc-Dung; Genge, Bela…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA
By: Shen, Zhidong; Chen, Weiying; Liang, Kaitai…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
QoS3: Secure Caching in HTTPS Based on Fine-Grained Trust Delegation
By: Al-Dailami, Abdulrahman; Ruan, Chang; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
polarRLCE: A New Code-Based Cryptosystem Using Polar Codes
By: Liu, Jingang; Wang, Yongge; Visconti, Andrea…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy
By: Li, Lin; Chang, Chin-Chen; Chen, Hefeng…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
«
1
2
3
4
5
6
7
8
9
10
»