e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(155)
Data Type
Journal Articles
(155)
Language
English
(155)
Country
Egypt
(155)
Authors / Persons
Yang, Qing
(11)
Del Rey, Ángel Martín
(10)
Khan, Muhammad Khurram
(10)
Qi, Lianyong
(7)
Choo, Kim-Kwang Raymond
(6)
Du, Xiaojiang
(5)
Li, Huaizhi
(5)
Antonopoulos, Angelos
(4)
Díaz-Verdejo, Jesús
(4)
Hu, Jiankun
(4)
Lorenz, Pascal
(4)
Maiorana, Emanuele
(4)
Yan, Zheng
(4)
Alazab, Mamoun
(3)
Cai, Z.
(3)
Conti, Vincenzo
(3)
Luo, Xiangyang
(3)
Masucci, Barbara
(3)
Qian, Zhenxing
(3)
Wang, Xiaoming
(3)
Zeadally, Sherali
(3)
Zhang, Zonghua
(3)
Show more
Update
Source
Security and Communication Networks
(155)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(155)
Range:
Search Results
(
1
-
50
of
155
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data
By: Liu, Zhen; Meng, Huanyu; Cai, Z.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
By: Zhang, Ru; Huo, Yanyu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
By: Meng, Qian; Ma, Jianfeng; Chen, Kefei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
By: Zheng, Kangfeng; Yang, Yixian; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
A Survey on Breaking Technique of Text-Based CAPTCHA
By: Luo, Xiangyang; Gong, Daofu; Qian, Zhenxing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature
By: Chiou, Shin-Yan; Wang, Tsung-Ju; Chen, Jiun-Ming…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
By: Chen, Hao; Wang, Tao; Park, Namje…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark
By: Guo, Xing; Zhang, Yiwen; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
By: Liu, Yi; Zhang, Hongqi; Han, Guangjie…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process
By: Yin, Ke; Conti, Vincenzo. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing
By: Li, Ji; Wei, Jianghong; Hu, Xuexian…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
By: Liu, Keyang; Zhang, Weiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
By: Han, Shuai; Liu, Shengli; Khan, Muhammad Khurram…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-27, 27 p.
Journal Articles
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation
By: Xia, Xiaona; Yu, Jiguo; Liu, Chang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Detecting Web-Based Botnets Using Bot Communication Traffic Features
By: Hsu, Fu-Hau; Ou, Chih-Wen; Hwang, Yan-Ling…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG
By: Madani, Mahdi; Tanougast, Camel; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
By: Zhang, Hua; Wen, Qiaoyan; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Multiuser Searchable Encryption with Token Freshness Verification
By: Sharma, Dhruti; Jinwala, Devesh C.; Zeadally, Sherali. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks
By: Li, Feng; Si, Yali; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends
By: Iturbe, Mikel; Zurutuza, Urko; Uribeetxeberria, Roberto…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-17, 17 p.
Journal Articles
Protecting Private Data by Honey Encryption
By: Yin, Wei; Indulska, Jadwiga; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks
By: Li, Tong; Zheng, Yuhui; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC
By: Yang, Wenjie; Weng, Jian; Luo, Weiqi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-8, 8 p.
Journal Articles
A Novel Construction of Substitution Box Involving Coset Diagram and a Bijective Map
By: Razaq, Abdul; Yousaf, Awais; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders
By: Yu, Yang; Cai, Z.; Mazurczyk, Wojciech…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth
By: Liu, Yujia; Yu, Nenghai; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
An Edge Correlation Based Differentially Private Network Data Release Method
By: Lu, Junling; Zhang, Lichen; Song, Houbing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-14, 14 p.
Journal Articles
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine
By: Wang, Ming-Hung; Lei, Chin-Laung; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-11, 11 p.
Journal Articles
A Multidomain Survivable Virtual Network Mapping Algorithm
By: Xiao, Xiancui; Zheng, Xiangwei; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
By: Sharma, Vishal; Lee, Kyungroul; Gómez-Skarmeta, Antonio F.…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-24, 24 p.
Journal Articles
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments
By: Rong, Hong; Wang, Huimei; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining
By: Li, Shuo; Wei, Jianguo; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks
By: Hu, Donghui; Shen, Qiang; Zhou, Shengnan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds
By: Xu, Xiaolong; Zhao, Xuan; Dou, Wanchun…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints
By: Kuang, Li; Wang, Yin; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks
By: Kamarudin, Muhammad Hilmi; Maple, Carsten; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-18, 18 p.
Journal Articles
Corrigendum to “Research on a New Signature Scheme on Blockchain”
By: Yuan, Chao; Xu, Mi-xue; Si, Xue-ming. Security and Communication Networks. No. 2017 (2017), pp.1-1, 1 p.
Journal Articles
BAS: The Biphase Authentication Scheme for Wireless Sensor Networks
By: Chung, Tae Sun; Rizvi, Sanam Shahla; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Authentication Protocols for Internet of Things: A Comprehensive Survey
By: Maglaras, Leandros A.; Jiang, Jianmin; Shu, Lei…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-41, 41 p.
Journal Articles
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment
By: Mao, Jian; Liu, Jianwei; Yang, Qing…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Remotely Exploiting AT Command Attacks on ZigBee Networks
By: Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
By: Zhang, Guoyin; Kou, Liang; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
Journal Articles
Android Rooting: An Arms Race between Evasion and Detection
By: Nguyen-Vu, Long; Chau, Ngoc-Tu; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-13, 13 p.
Journal Articles
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing
By: Andrysiak, Tomasz; Saganowski, Łukasz; Kiedrowski, Piotr…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
Privacy-Preserving Biometric Authentication: Challenges and Directions
By: Pagnin, Elena; Mitrokotsa, Aikaterini; Wang, Ding. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks
By: Khasawneh, Mahmoud; Agarwal, Anjali; Antonopoulos, Angelos. Security and Communication Networks. No. 2017 (2017), pp.1-16, 16 p.
Journal Articles
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups
By: Zhang, Jie; Ma, Chuangui; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-19, 19 p.
Journal Articles
A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace
By: Zhang, Huanguo; Hu, Jiankun; Shi, Yuan…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-15, 15 p.
Journal Articles
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection
By: Kozik, Rafał; Garcia-Teodoro, P.; Choraś, Michał. Security and Communication Networks. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Segmentation Based Video Steganalysis to Detect Motion Vector Modification
By: Wang, Peipei; Cao, Yun; Zhao, Xianfeng…[et al.]. Security and Communication Networks. No. 2017 (2017), pp.1-12, 12 p.
«
1
2
3
4
»