e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(282)
Data Type
Journal Articles
(282)
Language
English
(282)
Country
Egypt
(282)
Authors / Persons
You, Ilsun
(14)
Pan, Zhaoqing
(10)
Maiorana, Emanuele
(9)
Nicopolitidis, Petros
(9)
Yan, Zheng
(8)
Zhang, Xuyun
(8)
Conti, Vincenzo
(7)
Díaz-Verdejo, Jesús
(7)
Qi, Lianyong
(7)
Caballero-Gil, Pino
(6)
Maglaras, Leandros A.
(6)
Megias, David
(6)
Anees, Amir
(5)
Cai, Z.
(5)
Del Rey, Ángel Martín
(5)
Ma, Liran
(5)
Choo, Kim-Kwang Raymond
(4)
Di Pietro, Roberto
(4)
Hu, Jiankun
(4)
Kim, Kiseon
(4)
Mahalik, Prem
(4)
Meng, Weizhi
(4)
Qian, Zhenxing
(4)
Wang, Guojun
(4)
Wang, Wei
(4)
Zeadally, Sherali
(4)
Zhang, Xinpeng
(4)
Alazab, Mamoun
(3)
Andersson, Karl
(3)
Antonopoulos, Angelos
(3)
Chen, Thomas M.
(3)
Cogranne, Rémi
(3)
Fu, Qiang
(3)
Geneiatakis, Dimitrios
(3)
Genge, Bela
(3)
Gómez Mármol, Félix
(3)
He, Debiao
(3)
Hu, Chunqiang
(3)
Huo, Yan
(3)
Jiang, Qi
(3)
Li, Fenghua
(3)
Li, Huaizhi
(3)
Li, Tong
(3)
Liu, Qi
(3)
Liu, Zhe
(3)
Shen, Jian
(3)
Xiao, Di
(3)
Yang, Geng
(3)
Yang, Laurence T.
(3)
Show more
Update
Source
Security and Communication Networks
(282)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(282)
Range:
Search Results
(
151
-
200
of
282
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Survey of Authentication and Authorization for the Internet of Things
By: Trnka, Michal; Cerny, Tomas; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
By: Barrowclough, John Patrick; Zeadally, Sherali; Asif, Rameez. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
Journal Articles
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures
By: Song, Yurong; Yang, Lu-Xing; Jiang, Guo-Ping…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks
By: Du, Yi-Hong; Liu, Shihua; Del Rey, Ángel Martín. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks
By: El Ksimi, Ali; Li, Wenjia; Leghris, Cherkaoui. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
By: Xie, Run; Zhang, Xiao Jun; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things
By: Xu, Jun; Zhang, Xiong; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism
By: Yuan, Ye; Wu, Liji; Mujahid, Umar…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest
By: Idhammad, Mohamed; Afdel, Karim; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
By: Wagner, Thomas D.; Palomar, Esther; Mahbub, Khaled…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique
By: Wang, Guojun; Zhang, Yaoxue; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures
By: Su, Xin; Choi, Chang; Choi, Dongmin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Demadroid: Object Reference Graph-Based Malware Detection in Android
By: Wang, Huanran; He, Hui; Zhang, Weizhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries
By: Wang, Xiajing; Ma, Rui; Choo, Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking
By: Zhu, Qingyi; Loke, Seng W.; Karyotis, Vasileios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model
By: Zhang, Chunming; Xiao, Jingwei; Del Rey, Ángel Martín. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network
By: Wang, Yulong; Yi, Junjie; Guo, Jun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
Journal Articles
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization
By: Novikova, Evgenia; Shorov, Andrey; Gómez Mármol, Félix…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
By: Zhao, Yan; Li, Shiming; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
GLPP: A Game-Based Location Privacy-Preserving Framework in Account Linked Mixed Location-Based Services
By: Ma, Zhuo; Cao, Jiuxin; Yang, Laurence T.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Security Measurement for Unknown Threats Based on Attack Preferences
By: Guo, Yunchuan; Binxing, Fang; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things
By: Wang, Chen; Shen, Jian; Ren, Yongjun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Efficient Compression and Encryption for Digital Data Transmission
By: Carpentieri, Bruno; Choo, Kim-Kwang Raymond. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence
By: Lee, Jong-Hwan; Joo, Jeung-Min; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
HAC: Hybrid Access Control for Online Social Networks
By: Li, Hui; Guo, Yunchuan; Niu, Ben…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Latent Fingerprint Segmentation Based on Ridge Density and Orientation Consistency
By: Liu, Manhua; Liu, Shuxin; Yan, Weiwu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
By: Jaïdi, Faouzi; Labbene Ayachi, Faten; Bouhoula, Adel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-22, 22 p.
Journal Articles
An Efficient Certificateless Generalized Signcryption Scheme
By: Zhang, Bo; Jia, Zhongtian; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Data Fusion for Network Intrusion Detection: A Review
By: Yan, Zheng; Fu, Yulong; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
A Framework for Vulnerability Detection in European Train Control Railway Communications
By: Arsuaga, Irene; Toledo, Nerea; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Energy-Aware Key Exchange for Securing Implantable Medical Devices
By: Choi, Wonsuk; Conti, Vincenzo; Lee, Dong Hoon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys
By: Wei, Songjie; Li, Shuai; Liu, Peilong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation
By: Danner, Gábor; Berta, Árpád; Lin, Po-Ching…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Uncovering Tor: An Examination of the Network Structure
By: Monk, Bryan; Mitchell, Julianna; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication
By: Safavi-Naini, Reihaneh; Poostindouz, Alireza; Okhravi, Hamed…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Jammer Localization in Multihop Wireless Networks Based on Gravitational Search
By: Wei, Xianglin; Fan, Jianhua; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack
By: Zhao, Yuntao; Feng, Yongxin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions
By: Wang, Yao; Cai, Wandong; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
An Approach for Internal Network Security Metric Based on Attack Probability
By: Shan, Chun; Jiang, Benfu; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Survey on Security-Aware Measurement in SDN
By: Cai, Z.; Liu, Qiang; Li, Yangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
A DDoS Attack Detection Method Based on SVM in Software Defined Network
By: Ye, Jin; Cheng, Xiangyang; Cai, Z.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments
By: Chen, Yun; Lv, Kun; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
LWR-Based Fully Homomorphic Encryption, Revisited
By: Li, Jie; Chen, Kefei; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN
By: Granjal, Jorge; Pedroso, Artur; Gómez Mármol, Félix. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Development of the ECAT Preprocessor with the Trust Communication Approach
By: Ovaz Akpinar, Kevser; Maglaras, Leandros A.; Ozcelik, Ibrahim. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
By: Chen, Yanan; Xiong, Hu; Xu, Weixiang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks
By: Zeng, Yongbin; Nicopolitidis, Petros; Li, Guang-song…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
AppFA: A Novel Approach to Detect Malicious Android Applications on the Network
By: He, Gaofeng; Kambourakis, Georgios; Zhu, Haiting…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Large-Scale Analysis of Remote Code Injection Attacks in Android Apps
By: Choi, Hyunwoo; Lin, Po-Ching; Kim, Yongdae. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
On the Complexity of Impossible Differential Cryptanalysis
By: Yang, Qianqian; Hu, Lei; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
«
1
2
3
4
5
6
»