e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(191)
Data Type
Journal Articles
(191)
Language
English
(191)
Country
Egypt
(191)
Authors / Persons
Li, Fagen
(11)
Gope, Prosanta
(9)
Genge, Bela
(8)
Megias, David
(8)
Nicopolitidis, Petros
(8)
Galdi, Clemente
(7)
Maiorana, Emanuele
(7)
Angin, Pelin
(6)
Del Rey, Ángel Martín
(6)
Cimato, Stelvio
(5)
Maglaras, Leandros A.
(5)
Yeh, Kuo-Hui
(5)
Alazab, Mamoun
(4)
Díaz-Verdejo, Jesús
(4)
Jung, Ki-Hyun
(4)
Zhang, Mingwu
(4)
Zhang, Xiaosong
(4)
Chang, Chin-Chen
(3)
Chen, Hefeng
(3)
Chen, Jiageng
(3)
Conti, Vincenzo
(3)
Hu, Teng
(3)
Liu, Xiaolei
(3)
Namin, Akbar S.
(3)
Palomar, Esther
(3)
Schrittwieser, Sebastian
(3)
Song, Houbing
(3)
Sousa, Leonel
(3)
Su, Chunhua
(3)
Wang, Hao
(3)
Wang, Jian
(3)
Show more
Update
Source
Security and Communication Networks
(191)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(191)
Range:
Search Results
(
101
-
150
of
191
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
By: Ren, Jiadong; Hu, Jing-jing; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Integrating Traffics with Network Device Logs for Anomaly Detection
By: Zhuo, Zhongliu; Hu, Teng; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Security Cryptanalysis of NUX for the Internet of Things
By: Liu, Yu; Liu, Xiaolei; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information
By: Pan, Zhisong; Guo, Shize; Ranchal, Rohit…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach
By: Yang, Lu-Xing; Yang, Xiaofan; Tang, Yuan Yan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
By: Zhan, Yu; Wang, Baocang; Megias, David. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
Journal Articles
CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving
By: Xie, Yong; Zhang, Songsong; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme
By: Wang, Baocang; Ping, Yuan; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-6, 6 p.
Journal Articles
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks
By: Yu, Nenghai; Radenkovic, Milena; Xiong, Ling…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices
By: Lee, Sanghoon; Araujo, Alvaro; Jeong, Ik Rae. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
By: Lu, Qian; Qu, Haipeng; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol
By: Abu Dhailah, Hala; Taqieddin, Eyad; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
A Practical Authentication Framework for VANETs
By: Wang, Baosheng; Wang, Yi; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud
By: Song, Yujiao; Wang, Hao; Wu, Lei…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
By: Wang, Ping; Wang, Ding; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense
By: Niakanlahiji, Amirreza; Alazab, Mamoun; Jafarian, Jafar Haadi. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence
By: Park, Hojoong; Yeom, Yongjin; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group
By: Zhang, Yu; Li, Yin; Wang, Yifan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Anonymous and Efficient Message Authentication Scheme for Smart Grid
By: Zeadally, Sherali; Di Pietro, Roberto; He, Debiao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
By: E, Munivel; Cimato, Stelvio; A, Kannammal. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification
By: Xu, Li; Xun, Yi; Zhang, Mingwu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
By: Maglaras, Leandros A.; Derhab, Abdelouahid; Bernal Bernabe, Jorge…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-20, 20 p.
Journal Articles
Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity
By: Jafary, Peyman; Supponen, Antti; Wei, Jin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries
By: van Ginkel, Neline; De Groef, Willem; Massacci, Fabio…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
Journal Articles
Detection of Dummy Trajectories Using Convolutional Neural Networks
By: Pan, Jiaji; Zhang, Weiming; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
The Prediction of Serial Number in OpenSSL’s X.509 Certificate
By: Wang, Jizhi; Peinado, A.. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Erratum to “A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism”
By: Yuan, Ye; Wu, Liji; Yang, Yijun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-2, 2 p.
Journal Articles
HeteMSD: A Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data
By: Ju, Ankang; Guo, Yuanbo; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic
By: Khatibzadeh, Leila; Bornaee, Zarrintaj; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Dynamic Resource Provisioning on Fog Landscapes
By: Pham-Nguyen, Hoang-Nam; Nicopolitidis, Petros; Tran-Minh, Quang. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Visual and Textual Analysis for Image Trustworthiness Assessment within Online News
By: Lago, Federica; Phan, Quoc-Tin; Boato, Giulia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach
By: Dang, Tran Khanh; Yeh, Kuo-Hui; Tran, Khanh T. K.. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
Journal Articles
Corrigendum to “Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing”
By: Cheng, Jieren; Li, Mengyang; Sheng, Victor S.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
Journal Articles
Optimizing Computer Worm Detection Using Ensembles
By: Ochieng, Nelson; Waweru Mwangi, Ronald; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Security Measure for Image Steganography Based on High Dimensional KL Divergence
By: Song, Haitao; Tang, Guangming; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing
By: He, Lei; Ma, Jianfeng; Palomar, Esther…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Corrigendum to “Development of the ECAT Preprocessor with the Trust Communication Approach”
By: Ovaz Akpinar, Kevser; Ozcelik, Ibrahim. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
Journal Articles
Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks
By: Jeong, Young-Seob; Woo, Jiyoung; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
By: Choi, Joseph I.; Butler, Kevin R. B.; Genge, Bela. Security and Communication Networks. No. 2019 (2019), pp.1-28, 28 p.
Journal Articles
EPLC: An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid
By: Xiong, Yinqiao; Zhu, Peidong; Palomar, Esther…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment
By: Liu, Wenjie; Chen, Hanwu; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization
By: Zhao, Yuntao; Bo, Bo; Feng, Yongxin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem
By: Chen, Hefeng; Chang, Chin-Chen; D’Antonio, Salvatore. Security and Communication Networks. No. 2019 (2019), pp.1-7, 7 p.
Journal Articles
On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree
By: Ustimenko, Vasyl; Romańczuk-Polubiec, Urszula; Wróblewska, Aneta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
By: Abu Zant, Mahmoud; Gope, Prosanta; Yasin, Adwan. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication
By: Lu, Tianbo; Meng, Ting; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Usability Evaluation Model for Biometric System considering Privacy Concern Based on MCDM Model
By: Oh, Junhyoung; Lee, Kyungho; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Dynamic Nonparametric Random Forest Using Covariance
By: Choi, Seok-Hwan; Shin, Jin-Myeong; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things
By: Zhou, Yu; Wei, Yongzhuang; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key
By: Salguero Dorokhin, Édgar; Fuertes, Walter; Yeh, Kuo-Hui…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
«
1
2
3
4
»