معرفة
قاعدة البيانات العربية الرقمية "معرفة"
الرئيسية
الخدمات
معامل التأثير "آرسيف"
المفضلة
اتصل بنا
Language
English
العربية
تسجيل الدخول
بحث
تصفح
All
العنوان
المؤلفين / الأشخاص
المؤسسة
بحث
بحث متقدم
بحث متقدم
محددات البحث
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
و
أو
ليس
الكل
المستخلص
المؤلفين/ الأشخاص
الدولة
المؤسسة
ردمد / ردمك
الموضوع الرئيسي
رقم السجل
المصدر
قائمة المحتويات
العنوان
الموضوعات
محددات الوثيقة
لها نص كامل
العبارة
تحتوي
مطابقة
أي كلمة
Language
العربية
الفرنسية
الإنجليزية
عدد الصفحات
مساوي
أقل من
أكبر من
الصفحات
نوع الوثيقة
مقالات
كتاب
فصل كتاب
دوريات
أطروحات عالمية
رسائل جامعية
أوراق مؤتمرات
عرض كتاب
تقرير إحصائي
التقارير السنوية
مؤتمر
المكنز
البرامج الأكاديمية والتدريب
الجوائز
المفاهيم و المصطلحات
مؤسسة
سؤال استطلاع
فتاوى
الشهادات التدريب
استطلاعات الرأي العام
القرارات الشرعية
ملف شخص
الحوكمة
النظام الأساسي
تقرير مدققي الحسابات
القوانين و التشريعات
تقارير الشركات
سلسلة كتب
التقارير الربعية
عرض مؤتمر
كتاب جامعي
فصل كتاب جامعي
من
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
إلى
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
تقييد النتائج
التخصصات الرئيسية
تكنولوجيا المعلومات وعلم الحاسوب
(872)
نوع البيانات
مقالات
(872)
اللغة
الإنجليزية
(872)
الدولة
مصر
(872)
المصدر
Security and Communication Networks
(872)
الفترة:
نتائج البحث
(
251
-
300
من
872
)
الصلة
تاريخ النشر تصاعدي
تاريخ النشر تنازلي
العنوان تصاعدي
العنوان تنازلي
المؤلف تصاعدي
المؤلف تنازلي
مقالات
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing
By: Zeng, Jianping; Wu, Shuang; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning
By: Zhang, Yuchen; Namin, Akbar S.; Liu, Jing. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis
By: Han, Mee Lan; Kwak, Byung Il; Kim, Huy Kang…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
مقالات
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms
By: Lin, Guofeng; Xia, Yunhao; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Cryptanalysis of the Lightweight Block Cipher BORON
By: Liang, Huicong; Conti, Vincenzo; Wang, Meiqin. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard
By: Rizwan, Muhammad; Maglaras, Leandros A.; Ahmad, Fahad…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
By: Mo, Jiaqing; Genge, Bela; Chen, Hang. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
مقالات
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model
By: Lai, Yingxu; Liu, Jing; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
By: Li, Quanrun; Hsu, Chingfang; He, Debiao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Novel Meaningful Image Encryption Based on Block Compressive Sensing
By: Huang, Xiaoling; Zhou, Junwei; Milutinovic, Veljko…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security
By: Shahzad, Imran; Razaq, Abdul; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification
By: Gao, Hui; Chen, Yunfang; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Active Defense Strategy Selection Method Based on Two-Way Signaling Game
By: Liu, Xiaohu; Zhang, Heng-wei; Zhang, Yuchen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Estimating the Relative Speed of RF Jammers in VANETs
By: Kosmanos, Dimitrios; Argyriou, Antonios; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
مقالات
Session-Based Webshell Detection Using Machine Learning in Web Logs
By: Wu, Yixin; Huang, Cheng; Schrittwieser, Sebastian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks
By: Benisha, R. B.; Gope, Prosanta; Raja Ratna, S.. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping
By: Gu, Dawu; Jin, Chenhui; Guan, Jie…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
مقالات
Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments
By: Albahar, Marwan Ali; Li, Huaizhi. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol
By: Xu, Yibin; Huang, Yangyu; Milutinovic, Veljko. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection
By: Hu, Langtao; Zheng, Xin; Sorce, Salvatore…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions
By: Pedone, Ignazio; Lioy, Antonio; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Analysis of DES Plaintext Recovery Based on BP Neural Network
By: Fan, Sijie; Sousa, Leonel; Zhao, Yaqun. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
مقالات
A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code
By: Yu, Bin; Fu, Zhengxin; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
مقالات
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD
By: Čeponis, Dainius; Kim, Hyoungshick; Goranin, Nikolaj. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
مقالات
An API Semantics-Aware Malware Detection Method Based on Deep Learning
By: Ma, Xin; Pan, Zhisong; Li, Wenjia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
مقالات
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels
By: Karimi Rizi, A.; Nematbakkhsh, Naser; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-23, 23 p.
مقالات
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic
By: Niu, Weina; Li, Ting; Zhang, Xiaosong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
An Indistinguishably Secure Function Encryption Scheme
By: Zhang, Ping; Liu, Muhua; Sousa, Leonel…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
By: Wang, Dong; Zhang, Xiaosong; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-19, 19 p.
مقالات
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis
By: Xu, Yahong; Yang, Geng; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
A Novel Construction of Constrained Verifiable Random Functions
By: Liu, Muhua; Zhang, Ping; Wu, Qingtao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images
By: Kim, Pyung-Han; Giri, Debasis; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs
By: Liang, Kaitai; Yang, Bo; Gringoli, Francesco…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method
By: Tang, Junwei; Nicopolitidis, Petros; Xu, Zhiyong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-20, 20 p.
مقالات
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition
By: Zhang, ShuaiWei; Yang, XiaoYuan; Agosta, Giovanni…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems
By: Wang, Jun; Luo, Feixiang; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
Corrigendum to “Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”
By: Asif, Rameez; Buchanan, William J.. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
مقالات
An Analysis of DDoS Attacks on the Instant Messengers
By: Faisal, Mohammad; Abbas, Sohail; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
مقالات
VPN Traffic Detection in SSL-Protected Channel
By: Zain ul Abideen, Muhammad; Saleem, Shahzad; Soundrapandiyan, Rajkumar…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
مقالات
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks
By: Wang, Weiping; Zhang, Shigeng; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs
By: Pan, Jiaye; Zhuang, Yi; Nepal, Surya…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-22, 22 p.
مقالات
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem
By: Rantos, Konstantinos; Drosatos, George; Genge, Bela…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
By: Chen, Hefeng; Chang, Chin-Chen; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-7, 7 p.
مقالات
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms
By: Song, Baek Kyung; Cimato, Stelvio; Yoon, Ji Won…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
مقالات
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis
By: Choi, Mi-Jung; Kim, Hajin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
مقالات
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN
By: Yu, Haisheng; Li, Keqiu; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
مقالات
Smart Detection: An Online Approach for DoSDDoS Attack Detection Using Machine Learning
By: Lima Filho, Francisco Sales de; Silveira, Luiz F. Q.; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
مقالات
Multidivisible OnlineOffline Cryptography and Its Application to Signcryptions
By: Yamamoto, Dan; Kapron, Bruce M.; Ogata, Wakaha. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
مقالات
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy
By: Yu, Chuan; Cai, Z.; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
مقالات
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis
By: Kim, Daegeon; Kim, Huy Kang; Nepal, Surya. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
«
1
2
3
4
5
6
7
8
9
10
»