e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(282)
Data Type
Journal Articles
(282)
Language
English
(282)
Country
Egypt
(282)
Authors / Persons
You, Ilsun
(14)
Pan, Zhaoqing
(10)
Maiorana, Emanuele
(9)
Nicopolitidis, Petros
(9)
Yan, Zheng
(8)
Zhang, Xuyun
(8)
Conti, Vincenzo
(7)
Díaz-Verdejo, Jesús
(7)
Qi, Lianyong
(7)
Caballero-Gil, Pino
(6)
Maglaras, Leandros A.
(6)
Megias, David
(6)
Anees, Amir
(5)
Cai, Z.
(5)
Del Rey, Ángel Martín
(5)
Ma, Liran
(5)
Choo, Kim-Kwang Raymond
(4)
Di Pietro, Roberto
(4)
Hu, Jiankun
(4)
Kim, Kiseon
(4)
Mahalik, Prem
(4)
Meng, Weizhi
(4)
Qian, Zhenxing
(4)
Wang, Guojun
(4)
Wang, Wei
(4)
Zeadally, Sherali
(4)
Zhang, Xinpeng
(4)
Alazab, Mamoun
(3)
Andersson, Karl
(3)
Antonopoulos, Angelos
(3)
Chen, Thomas M.
(3)
Cogranne, Rémi
(3)
Fu, Qiang
(3)
Geneiatakis, Dimitrios
(3)
Genge, Bela
(3)
Gómez Mármol, Félix
(3)
He, Debiao
(3)
Hu, Chunqiang
(3)
Huo, Yan
(3)
Jiang, Qi
(3)
Li, Fenghua
(3)
Li, Huaizhi
(3)
Li, Tong
(3)
Liu, Qi
(3)
Liu, Zhe
(3)
Shen, Jian
(3)
Xiao, Di
(3)
Yang, Geng
(3)
Yang, Laurence T.
(3)
Show more
Update
Source
Security and Communication Networks
(282)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(282)
Range:
Search Results
(
51
-
100
of
282
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
By: Li, J.; Zhang, Yichen; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
By: Pan, Chen; Huang, Xiaoling; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy
By: Li, Zhaozheng; Lei, Wei-min; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
An Improved Permission Management Scheme of Android Application Based on Machine Learning
By: Niu, Shaozhang; Huang, Ruqiang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things
By: Zhu, Youwen; Wang, Xianmin; Yang, Laurence T.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
A Secure Multimedia Data Sharing Scheme for Wireless Network
By: Fang, Liming; Liu, Liang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS
By: Qiang, Weizhong; Jin, Hai; Martínez Pérez, Gregorio…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network
By: Ge, Chunpeng; Xia, Jinyue; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
By: Sun, Jin; Wu, Zebin; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement
By: Wei, Qiang; Zhao, Zheng; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
By: Wang, Xin; Yang, Bo; Xia, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning
By: Cheng, Jieren; Sheng, Victor S.; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-19, 19 p.
Journal Articles
An Ensemble Learning Method for Wireless Multimedia Device Identification
By: Zhang, Zhen; Wang, Jin; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
A Privacy Protection Model of Data Publication Based on Game Theory
By: Kuang, Li; Zhu, Yujia; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems
By: Hao, Yaojun; Díaz-Verdejo, Jesús; Zhang, Fuzhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-33, 33 p.
Journal Articles
An Evolutionary Computation Based Feature Selection Method for Intrusion Detection
By: Xue, Yu; Pang, Wei; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A Constraint-Aware Optimization Method for Concurrency Bug Diagnosis Service in a Distributed Cloud Environment
By: Bo, Lili; Zhang, Xuyun; Jiang, Shujuan. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Differential Cryptanalysis on Block Cipher Skinny with MILP Program
By: Zhang, Pei; Pan, Zhaoqing; Zhang, Wenying. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Novel Technique for the Construction of Safe Substitution Boxes Based on Cyclic and Symmetric Groups
By: Razaq, Abdul; Alolaiyan, Hanan; Riaz, Arshad…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Differentially Private Recommendation System Based on Community Detection in Social Network Applications
By: Cai, Zhipeng; Yin, Guisheng; He, Zaobo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
Journal Articles
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption
By: Huang, Qinlong; Yang, Yixian; Wang, Wei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Towards a Novel Trust-Based Multicast Routing for VANETs
By: Xia, Hui; Zhang, San-shun; Hu, Chunqiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Data-Driven and Low-Sparsity False Data Injection Attacks in Smart Grid
By: Tian, Jiwei; Wang, Buhong; Wei, Jin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems
By: Wang, Jinbao; Gao, Hong; Ma, Liran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
User Presence Inference via Encrypted Traffic of Wireless Camera in Smart Homes
By: Ji, Xiaoyu; Cheng, Yushi; Xu, Wenyuan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Deep Learning Hash for Wireless Multimedia Image Content Security
By: Zheng, Yu; Zhu, Jiezhong; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
An Artificial Intelligence Approach to Financial Fraud Detection under IoT Environment: A Survey and Implementation
By: Choi, Dahee; Lee, Kyungho; You, Ilsun. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks
By: Xu, Xiaolong; Zhang, Jie; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor
By: Park, Taehwan; Seo, Hwajeong; Kim, Howon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Key Substitution Attacks on Lattice Signature Schemes Based on SIS Problem
By: Lee, Hyang-Sook; Lim, Seongan; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Novel Approach for Classifying MANETs Attacks with a Neutrosophic Intelligent System based on Genetic Algorithm
By: Elwahsh, Haitham; Caballero-Gil, Pino; El-Henawy, Ibrahim M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
RoughDroid: Operative Scheme for Functional Android Malware Detection
By: Riad, Khaled; Qi, Lianyong; Ke, Lishan. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms
By: Yuan, Ye; Xiao, Junting; Lee, Mun-Kyu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication
By: Wan, Ming; Song, Yan; Jing, Yuan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Performance Analysis of Hyperledger Fabric Platforms
By: Nasir, Qassim; Nassif, Ali Bou; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Corrigendum to “A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks”
By: Şimşek, Mehmet. Security and Communication Networks. No. 2018 (2018), pp.1-2, 2 p.
Journal Articles
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing
By: Zhang, Yinghui; Zheng, Dong; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Automatic Benchmark Generation Framework for Malware Detection
By: Shan, Zheng; Cilardo, Alessandro; Chen, Yihang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications
By: Argyriou, Marios; Dragoni, Nicola; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds
By: Dai, Hua; Yang, Geng; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis
By: Swain, Gandharba; Qian, Zhenxing. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling
By: Seo, Jungwoo; Nicopolitidis, Petros; Lee, Sangjin. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
Journal Articles
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image
By: Zhang, Xianquan; Tang, Zhenjun; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN
By: Lara-Nino, Carlos Andres; Diaz-Perez, Arturo; Morales-Sandoval, Miguel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark
By: Zhou, Yuanyuan; Yuan, Yuan; He, Qiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
By: Choo, Kim-Kwang Raymond; He, Debiao; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
HardwareSoftware Adaptive Cryptographic Acceleration for Big Data Processing
By: Xiao, Chunhua; Zhang, Lei; Zhou, Jun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-24, 24 p.
Journal Articles
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network
By: Yan, Binghao; Genge, Bela; Han, Guodong. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection
By: Hingant, Javier; Zambrano, Marcelo; Martínez Pérez, Gregorio…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
An Adaptive Audio Steganography for Covert Wireless Communication
By: Xin, Guojiang; Liu, Yuling; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
«
1
2
3
4
5
6
»