e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
551
-
600
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Trust Management in Collaborative Systems for Critical Infrastructure Protection
By: Ait Aali, Nawal; Baina, Amine; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks
By: Zare-Garizy, Tirazheh; Fridgen, Gilbert; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
Journal Articles
Moving Target Defense Techniques: A Survey
By: Lei, Cheng; Tan, Jinglei; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-25, 25 p.
Journal Articles
A Security Sandbox Approach of Android Based on Hook Mechanism
By: Jiang, Xin; Liu, Mingzhe; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Street-Level Landmark Evaluation Based on Nearest Routers
By: Li, Ruixiang; Qi, Lianyong; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties
By: Zhu, Liehuang; Li, Meng; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Detecting Potential Insider Threat: Analyzing Insiders’ Sentiment Exposed in Social Media
By: Park, Won; Lee, Kyungho; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization
By: Chang, Chin-Chen; Mao, Xiaoyang; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Efficient Isogeny Computations on Twisted Edwards Curves
By: Kim, Suhri; Hong, Seokhie; Lee, Mun-Kyu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Securing ZigBee Commercial Communications Using Constellation Based Distinct Native Attribute Fingerprinting
By: Rondeau, Christopher M.; Temple, Michael A.; Genge, Bela…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Design and Analysis of Push Notification-Based Malware on Android
By: Hyun, Sangwon; Palmieri, Francesco; Kim, Hyoungshick…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Secure and Efficient Image Retrieval over Encrypted Cloud Data
By: Liang, Haihua; Zhang, Xinpeng; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
A Secure Incentive Scheme for Vehicular Delay Tolerant Networks Using Cryptocurrency
By: Park, Youngho; You, Ilsun; Rhee, Kyung-Hyune…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Android Malware Characterization Using Metadata and Machine Learning Techniques
By: Martín, Ignacio; Hernández, José Alberto; Zeadally, Sherali…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest
By: Long, Jun; Liu, Qiang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
By: Seo, Seog Chung; Li, Huaizhi; Youn, Taek-Young. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing
By: Yang, Geng; Xiang, Yang; Dai, Hua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
Security Evaluation Framework for Military IoT Devices
By: Baek, Seungsoo; Kim, Seungjoo; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Network Programming and Probabilistic Sketching for Securing the Data Plane
By: Chehab, Ali; Di Pietro, Roberto; Kayssi, Ayman…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-23, 23 p.
Journal Articles
A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map
By: Anees, Amir; Hussain, Iqtadar; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
Journal Articles
Session Fingerprinting in Android via Web-to-App Intercommunication
By: Alepis, Efthimios; Wang, Guojun; Patsakis, Constantinos. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Blockchain Based Credibility Verification Method for IoT Entities
By: Qu, Chao; Tao, Ming; Wang, Wei…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Control Method for Sampled-Data Systems with Multiple Channels Based on Deadband-Triggered Scheme
By: Liu, Ying-Ying; Conti, Vincenzo; Chu, Yun-kai. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience
By: Zhang, Yinghui; Zheng, Dong; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Winternitz Signature Scheme Using Nonadjacent Forms
By: Roh, Dongyoung; Jung, Sangim; Kim, Kiseon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
By: Hu, Jiankun; Alazab, Mamoun; Ma, Jixin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF(2m) Based on Montgomery Arithmetic
By: Schramm, Martin; Dojen, Reiner; Ahmed, Fawad…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
Journal Articles
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
By: Jung, Jaewook; Lee, Youngsook; Won, Dongho…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis
By: Liu, Zhenyan; Zeng, Yifei; Xue, Jingfeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Static and Dynamic Analysis of Android Malware and Goodware Written with Unity Framework
By: Shim, Jaewoo; Park, Minkyu; Andersson, Karl…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
By: Wang, Gicheol; Cho, Gihwan; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
By: Li, Tong; You, Ilsun; Yan, Hongyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-6, 6 p.
Journal Articles
Secure Data Delivery with Linear Network Coding for Multiple Multicasts with Multiple Streams in Internet of Things
By: Shi, Lianmin; Wang, Yihuai; Peris-Lopez, P.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment
By: Xu, Zhiyan; He, Debiao; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
An Effective Classification Approach for Big Data Security Based on GMPLSMPLS Networks
By: Alouneh, Sahel; Ghinea, George; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Survey of Authentication and Authorization for the Internet of Things
By: Trnka, Michal; Cerny, Tomas; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
By: Barrowclough, John Patrick; Zeadally, Sherali; Asif, Rameez. Security and Communication Networks. No. 2018 (2018), pp.1-20, 20 p.
Journal Articles
A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures
By: Song, Yurong; Yang, Lu-Xing; Jiang, Guo-Ping…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks
By: Du, Yi-Hong; Liu, Shihua; Del Rey, Ángel Martín. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
Towards a New Algorithm to Optimize IPv6 Neighbor Discovery Security for Small Objects Networks
By: El Ksimi, Ali; Li, Wenjia; Leghris, Cherkaoui. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage
By: Xie, Run; Zhang, Xiao Jun; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
A High-Security and Smart Interaction System Based on Hand Gesture Recognition for Internet of Things
By: Xu, Jun; Zhang, Xiong; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism
By: Yuan, Ye; Wu, Liji; Mujahid, Umar…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest
By: Idhammad, Mohamed; Afdel, Karim; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
A Novel Trust Taxonomy for Shared Cyber Threat Intelligence
By: Wagner, Thomas D.; Palomar, Esther; Mahbub, Khaled…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique
By: Wang, Guojun; Zhang, Yaoxue; Giri, Debasis…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Study to Improve Security for IoT Smart Device Controller: Drawbacks and Countermeasures
By: Su, Xin; Choi, Chang; Choi, Dongmin…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Demadroid: Object Reference Graph-Based Malware Detection in Android
By: Wang, Huanran; He, Hui; Zhang, Weizhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries
By: Wang, Xiajing; Ma, Rui; Choo, Raymond…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking
By: Zhu, Qingyi; Loke, Seng W.; Karyotis, Vasileios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
«
7
8
9
10
11
12
13
14
15
16
»