e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
451
-
500
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model
By: Ro, Inwoo; Im, Eul Gyu; Tolomei, Gabriele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining
By: Li, Chen; Guo, Yecai; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization
By: Azam, Naveed Ahmed; Hayat, Umar; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Use of Data Visualisation for Zero-Day Malware Detection
By: Venkatraman, Sitalakshmi; Alazab, Mamoun; Yang, Qing. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud
By: Fu, Zhangjie; Xingming, Sun; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Identity-Based Proxy Signcryption Protocol with Universal Composability
By: Yu, Huifang; Wang, Zhicang; Peinado, A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
GANs Based Density Distribution Privacy-Preservation on Mobility Data
By: Yin, Dan; Ma, Liran; Yang, Qing. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Construction of a New Biometric-Based Key Derivation Function and Its Application
By: Seo, Minhye; Lee, Dong Hoon; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users
By: Yesiltepe, Mirsat; Kurulay, Muhammet; Conti, Vincenzo. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
By: Zhou, Zequan; Mao, Jian; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Practical Suitability and Experimental Assessment of Tree ORAMs
By: Al-Saleh, Kholoud; Belghith, Abdelfettah; Genge, Bela. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing
By: Cheng, Jieren; Sheng, Victor S.; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service
By: Song, Jian; Ma, Chuangui; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Research on Plaintext Restoration of AES Based on Neural Network
By: Hu, Xinyi; Yang, Ching-Nung; Zhao, Yaqun. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method
By: Wu, Zhendong; Yang, Jiajia; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking
By: Liu, Guangjie; Zhai, Jiangtao; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs
By: Jhaveri, Rutvij H.; Desai, Aneri; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN
By: Liu, Jianwei; Mao, Jian; Chen, Jie…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
Journal Articles
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model
By: Yin, Ke; Galdi, Clemente. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Network Intrusion Detection Method Based on PCA and Bayes Algorithm
By: Zhang, Bing; Ren, Jiadong; Choraś, Michał…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD
By: Nouioua, Imen; Amardjia, Nouredine; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord
By: Pecori, Riccardo; Fernandez-Gago, Carmen; Veltri, Luca. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Behaviors of High-Frequency Subscribers in Cellular Data Networks
By: Li, Jingtao; Liu, Yang; Geneiatakis, Dimitrios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
A General Architecture for Multiserver Authentication Key Agreement with Provable Security
By: Choo, Kim-Kwang Raymond; Nicopolitidis, Petros; He, Debiao…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys
By: Saha, Rahul; Kumar, Gulshan; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network
By: Zhang, Jinquan; Yu, Jiguo; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos
By: Flores Siordia, Octavio; Gutiérrez, Juan Carlos Estrada; Radwan, Ahmed G.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition
By: Han, Qilong; Zhang, Kejia; Ma, Liran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things
By: Gao, Honghao; Qi, Lianyong; Wang, Xiaolin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification
By: Kang, Baoyuan; Li, Chunqing; Vassilakopoulos, Michael…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments
By: Park, Cheolhee; Kim, Hyunil; Liu, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks
By: Coruh, Uğur; Palomar, Esther; Bayat, Oguz. Security and Communication Networks. No. 2018 (2018), pp.1-25, 25 p.
Journal Articles
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications
By: Bilal, Muhammad; Asif, Muhammad; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism
By: Haguouche, Samira; Yeh, Kuo-Hui; Jarir, Zahi. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Privacy Preservation for Friend-Recommendation Applications
By: Wang, Weicheng; Wang, Shengling; Huo, Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
By: Li, J.; Zhang, Yichen; Megias, David…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
By: Pan, Chen; Huang, Xiaoling; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Relative Phase Based Audio Integrity Protection Method: Model and Strategy
By: Li, Zhaozheng; Lei, Wei-min; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
An Improved Permission Management Scheme of Android Application Based on Machine Learning
By: Niu, Shaozhang; Huang, Ruqiang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
FTP: An Approximate Fast Privacy-Preserving Equality Test Protocol for Authentication in Internet of Things
By: Zhu, Youwen; Wang, Xianmin; Yang, Laurence T.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
A Secure Multimedia Data Sharing Scheme for Wireless Network
By: Fang, Liming; Liu, Liang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS
By: Qiang, Weizhong; Jin, Hai; Martínez Pérez, Gregorio…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network
By: Ge, Chunpeng; Xia, Jinyue; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
By: Sun, Jin; Wu, Zebin; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
CAFA: A Checksum-Aware Fuzzing Assistant Tool for Coverage Improvement
By: Wei, Qiang; Zhao, Zheng; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Cheating Detectable Privacy-Preserving Data Sharing Scheme for Cloud Computing
By: Wang, Xin; Yang, Bo; Xia, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning
By: Cheng, Jieren; Sheng, Victor S.; Qi, Lianyong…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-19, 19 p.
Journal Articles
An Ensemble Learning Method for Wireless Multimedia Device Identification
By: Zhang, Zhen; Wang, Jin; Meng, Weizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
A Privacy Protection Model of Data Publication Based on Game Theory
By: Kuang, Li; Zhu, Yujia; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems
By: Hao, Yaojun; Díaz-Verdejo, Jesús; Zhang, Fuzhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-33, 33 p.
«
5
6
7
8
9
10
11
12
13
14
»