e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(244)
Data Type
Journal Articles
(244)
Language
English
(244)
Country
Egypt
(244)
Authors / Persons
Xu, Xiaolong
(23)
Galdi, Clemente
(9)
Gao, Honghao
(8)
Xia, Zhihua
(8)
Nazir, Shah
(7)
Anees, Amir
(6)
Cimato, Stelvio
(6)
Del Rey, Angel M.
(6)
Gope, Prosanta
(6)
Liang, Kaitai
(6)
Liu, Zhe-Li
(6)
Pan, Zhaoqing
(6)
Alazab, Mamoun
(5)
Maglaras, Leandros
(5)
Nicopolitidis, Petros
(5)
Sciancalepore, Savio
(5)
Alcaraz, Cristina
(4)
Mostarda, Leonardo
(4)
Wanchun, Dou
(4)
Xu, Lingwei
(4)
Zhang, Yin
(4)
Afzal, Hammad
(3)
Aziz, Benjamin
(3)
Chen, Xingshu
(3)
Di Pietro, Roberto
(3)
Hu, Jiankun
(3)
Huang, Cheng
(3)
Kapron, Bruce M.
(3)
Khan, Habib Ullah
(3)
Khokhar, Umar M.
(3)
Li, Bin
(3)
Li, Huaizhi
(3)
Liu, Jiayong
(3)
Maglaras, Leandros A.
(3)
Megias, David
(3)
Shaukat, Sajjad
(3)
Tian, Yuan
(3)
Valenza, Fulvio
(3)
Wang, Baocang
(3)
Wang, Mingqian
(3)
Zhuang, Yi
(3)
Show more
Update
Source
Security and Communication Networks
(244)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(244)
Range:
Search Results
(
1
-
50
of
244
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Improving Topic-Based Data Exchanges among IoT Devices
By: Liu, Peng; Zhu, Jianming; Zhang, Yanmei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Novel Comprehensive Watermarking Scheme for Color Images
By: Duan, Shaohua; Wang, Hanwen; Zhou, Nanrun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Defending Application Layer DDoS Attacks via Multidimensional Parallelotope
By: Zhao, Xiaolin; Peng, Hui; Li, Yue…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Diagnosis and Hardening Platform for an Asterisk VoIP PBX
By: Nuño, Pelayo; Suárez, Carla; Lombardi, Flavio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Secure and Efficient Image Compression-Encryption Scheme Using New Chaotic Structure and Compressive Sensing
By: Tang, Yongli; Zhao, Mingjie; Li, Lixiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Enabling Sector Scheduling for 5G-CPE Dense Networks
By: Jin, Tong; Tian, Liwei; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing
By: Guo, Jingjing; Gope, Prosanta; Sun, Jiacong. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Secrecy Performance Analysis of the NOMA System on High-Speed Railway
By: Yang, Jinxia; Peng, Xin; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
Journal Articles
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks
By: Yu, Qingying; Sun, Liping; Li, Xuejing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update
By: Liu, Zhe; Liang, Kaitai; Tang, Fei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access
By: Zhang, Kai; Li, Yanping; Vasilakos, Athanasios V.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Erratum to “Incremental Learning for Malware Classification in Small Datasets”
By: Xue, Di; Li, Jingmei; Wu, Weifei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-1, 1 p.
Journal Articles
Seam-Carved Image Tampering Detection Based on the Cooccurrence of Adjacent LBPs
By: Zhang, Dengyong; Chen, Xiao; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Energy Management Strategy Using Equivalent Consumption Minimization Strategy for Hybrid Electric Vehicles
By: Tao, Fazhan; Ji, Baofeng; Li, Xingwang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Detecting Web Spam Based on Novel Features from Web Page Source Code
By: Liu, Jiayong; Su, Yu; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Movie Recommendation System Based on Differential Privacy Protection
By: Li, Min; Zeng, Yingming; Peng, Hao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Visual Object Multimodality Tracking Based on Correlation Filters for Edge Computing
By: Yang, Guosheng; Gao, Honghao; Wei, Qisheng. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Cryptosystem Identification Scheme Based on ASCII Code Statistics
By: Zhang, Wenyu; Zhao, Yaqun; Del Rey, Angel M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
An Android Malware Detection Model Based on DT-SVM
By: Chen, Xingshu; Zhang, Hang; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Privacy-Preserving Blockchain-Based Nonlinear SVM Classifier Training for Social Networks
By: Jia, Nan; Fu, Shaojing; You, Ilsun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
DRHNet: A Deep Residual Network Based on Heterogeneous Kernel for Steganalysis
By: Xu, Yang; Fu, Zixi; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
A Key Business Node Identification Model for Internet of Things Security
By: Xie, Lixia; Ni, Huiyu; Yang, Hongyu…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
By: Huang, Xinyu; Tian, Yunzhe; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Secure and Effective Construction Scheme for Blockchain Networks
By: Shen, Yan; Li, Tao; Zhang, Zhen…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
Journal Articles
Research on Multidomain Authentication of IoT Based on Cross-Chain Technology
By: Yu, Jia; Gao, Xue; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
A Privacy-Protection Model for Patients
By: Yin, Xiangdong; Liu, Chunyan; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
On Enhancing TCP to Deal with High Latency and Transmission Errors in Geostationary Satellite Network for 5G-IoT
By: Zhao, Chenglin; Zhang, Zeyu; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
Journal Articles
A Novel Coevolutionary Approach to Reliability Guaranteed Multi-Workflow Scheduling upon Edge Computing Infrastructures
By: Wang, Zhenxing; Ma, Yong; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
By: Kim, Daegeon; Gu, Do Hyung; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
An Efficient Outsourced Oblivious Transfer Extension Protocol and Its Applications
By: Zhao, Shengnan; Song, Xiangfu; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Binary File’s Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification
By: Guo, Hui; Huang, Cheng; Zhang, Liguo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
Journal Articles
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things
By: Wu, Yixin; Zhang, Xing; Chen, Ting…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid
By: Zhou, Yousheng; Chen, Xinyun; Yang, Luxing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
An Unequal Image Privacy Protection Method Based on Saliency Detection
By: Tu, Rongxin; Wen, Wenying; Ye, Guodong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection
By: Hua, Qingyi; Zhang, Jing; Fang, Dingyi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing
By: Chen, Rongrong; Peng, Ziran; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature
By: Meng, Yitong; Liu, Zhe-Li; Fei, Jinlong. Security and Communication Networks. No. 2020 (2020), pp.1-21, 21 p.
Journal Articles
Chaotic Cryptosystem for Selective Encryption of Faces in Photographs
By: Aguilar Santiago, Jorge; Flores Siordia, Octavio; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-22, 22 p.
Journal Articles
High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model
By: Ke, Qiao; Liu, Yang; Wei, Wei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques
By: Xia, Qi; Zhang, Xiaosong; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications
By: El Hadj Youssef, Wajih; Abdelli, Ali; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Modelling the Mimic Defence Technology for Multimedia Cloud Servers
By: Feng, Feng; Zhou, Xia-Bing; Zhou, Qing-Lei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-22, 22 p.
Journal Articles
An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things
By: Yang, Hongyu; Xu, Guangquan; Li, Wenjuan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network
By: Noh, Siwan; Shin, Sang Uk; Liu, Zhe-Li…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing
By: Maryam, Afifa; Ahmed, Usman; Iqbal, Muhammad Azhar…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
3-Image Bit-Level Encryption Algorithm Based on 3D Nonequilateral Arnold Transformation and Hyperchaotic System
By: Huang, Huiqing; Bai, Sen; Cheng, Dongsheng. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning
By: Zhang, Shibin; Chang, Yan; Chen, Ting…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
SANS: Self-Sovereign Authentication for Network Slices
By: Salleras, Xavier; Daza, Vanesa; Fang, Liming. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
On the Value of Order Number and Power in Secret Image Sharing
By: Yu, Yongqiang; Li, Longlong; Lu, Yuliang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications
By: Aslan, Bora; Yavuzer Aslan, Füsun; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
«
1
2
3
4
5
»