e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
651
-
700
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
By: Jiang, Zhiyuan; Feng, Chao; Tang, Chaojing…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
Journal Articles
Analysis of Software Implemented Low Entropy Masking Schemes
By: Wang, An; Maiorana, Emanuele; Wang, Xiaoyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
A Modification-Free Steganography Method Based on Image Information Entropy
By: ShuangKui, Xia; Qian, Zhenxing; Wu, Jianbin. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
A Cascading Failure Model for Command and Control Networks with Hierarchy Structure
By: Gao, Xiu-e; Cilardo, Alessandro; Chen, Bo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Network Intrusion Detection with Threat Agent Profiling
By: Bajtoš, Tomáš; Gajdoš, Andrej; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
Security Feature Measurement for Frequent Dynamic Execution Paths in Software System
By: Ren, Jiadong; Cheng, Yongqiang; Yan, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development
By: Kang, HyunSeo; Sung, YoonJe; Mahalik, Prem…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Secure Virtualization Environment Based on Advanced Memory Introspection
By: Zhang, Shuhui; Meng, Xiangxu; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme
By: Yang, XiaoYuan; Wang, Xu An; Sgandurra, Daniele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors
By: Lee, Hyungu; Hwang, Jung Yeon; Anees, Amir…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192
By: Jiang, Zi-Long; Jin, Chenhui; Liu, Zhe. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Vulnerability Analysis of Network Scanning on SCADA Systems
By: Coffey, Kyle; Maglaras, Leandros A.; Janicke, Helge…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
Journal Articles
Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting
By: Lee, Suk-Hwan; Maiorana, Emanuele. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Detecting Malware with an Ensemble Method Based on Deep Neural Network
By: Yan, Jinpei; Qi, Yong; Zhang, Zonghua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption
By: Xiao, Dianyan; You, Ilsun; Yu, Yang. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
By: Ou, Lu; Yin, Hui; Qin, Zheng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate
By: Yao, Yu; Yang, Wei; Wang, Ying…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Close to Optimally Secure Variants of GCM
By: Zhang, Ping; Hu, Hong-Gang; Singh, Kamal Deep…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Leverage Website Favicon to Detect Phishing Websites
By: Chiew, Kang Leng; Choo, Jeffrey Soon-Fatt; Sze, San Nah…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Novel Immune-Inspired Shellcode Detection Algorithm Based on Hyperellipsoid Detectors
By: Lu, Tianliang; Zhang, Lu; D’Arco, Paolo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks
By: Ma, Maode; Chen, Thomas M.; Li, Fenghua…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Defending against the Advanced Persistent Threat: An Optimal Control Approach
By: Yang, Xiaofan; Wen, Junhao; Tang, Yuan Yan…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT
By: Luo, Ming; Luo, Yi; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
Leveraging KVM Events to Detect Cache-Based Side Channel Attacks in a Virtualization Environment
By: Paundu, Ady Wahyudi; Fall, Doudou; Mazurczyk, Wojciech…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-18, 18 p.
Journal Articles
Using Physical Context-Based Authentication against External Attacks: Models and Protocols
By: Melo, Wilson S.; Machado, Raphael C. S.; Carmo, Luiz F. R. C.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Quantum Cryptography for the Future Internet and the Security Analysis
By: Shen, Jian; Li, Xiong; Wang, Chen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
A New Chaos-Based Color Image Encryption Scheme with an Efficient Substitution Keystream Generation Strategy
By: Fu, Chong; Zhang, Gao-yuan; Zhang, Leo Y.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
NOSArmor: Building a Secure Network Operating System
By: Jo, Hyeonseong; Nam, Jaehyun; Shin, Seungwon…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
By: Sija, Baraka D.; Kim, Myung-Sup; Liu, Zhe…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-17, 17 p.
Journal Articles
Validating User Flows to Protect Software Defined Network Environments
By: Abdulqadder, Ihsan H.; Deqing, Zou; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques
By: Chu, Zhihui; Dong, Xiaoyang; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
International Network Performance and Security Testing Based on Distributed Abyss Storage Cluster and Draft of Data Lake Framework
By: Cha, ByungRae; Pan, Sung Bum; You, Ilsun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation
By: Dragoni, Nicola; Bugliesi, Michele; Spognardi, Angelo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-30, 30 p.
Journal Articles
Iris Template Protection Based on Local Ranking
By: Zhao, Dongdong; Fang, Shu; Xiong, Shengwu…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
By: Chen, Xianyi; Zhong, Haidong; Cogranne, Rémi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing
By: Zhao, Shuang; Luo, Xiapu; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-22, 22 p.
Journal Articles
Meaningful Image Encryption Based on Reversible Data Hiding in Compressive Sensing Domain
By: Li, Ming; Fan, Haiju; Kapron, Bruce M.…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition
By: Huang, Xiao-Yu; Tang, Shaohua; Cogranne, Rémi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction
By: Niu, Dongmei; Wang, Hongxia; Zhang, Xinpeng…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
Under Quantum Computer Attack: Is Rainbow a Replacement of RSA and Elliptic Curves on Hardware?
By: Yi, Haibo; Mujahid, Umar. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Practical Secure Transaction for Privacy-Preserving Ride-Hailing Services
By: Cao, Chenglong; Zhu, Xiaoling; Caballero-Gil, Pino. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
On the Antijamming Performance of the NR-DCSK System
By: Nguyen, Binh Van; Kim, Kiseon; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Separable Reversible Data Hiding in Encrypted Images Based on Two-Dimensional Histogram Modification
By: Xu, Dawen; Chen, Kai; Wang, Rangding…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Information Propagation Prediction Based on Key Users Authentication in Microblogging
By: Yu, Miao; Zhang, Yongzheng; Jiang, Qi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation
By: Zhang, Huaxiang; Cui, Lizhen; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Cloud Based Data Protection in Anonymously Controlled SDN
By: Shen, Jian; Lai, Chin-Feng; García-Magariño, Iván…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Detecting P2P Botnet in Software Defined Networks
By: Su, Shang-Chiuan; Chen, Yi-Ren; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
An Alternative Method for Understanding User-Chosen Passwords
By: Zheng, Zhixiong; Wang, Ping; Jiang, Qi…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
A Clustering K-Anonymity Privacy-Preserving Method for Wearable IoT Devices
By: Liu, Fang; Liu, Zhen; Li, Tong. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN
By: Han, Biao; Su, Jinshu; Hu, Chengchen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
«
9
10
11
12
13
14
15
16
17
18
»