e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
51
-
100
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Fed-SCNN: A Federated Shallow-CNN Recognition Framework for Distracted Driving
By: Wang, Yaojie; Cui, Xiaolong; Gao, Zhiqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism
By: Jiang, Lurong; Xu, Qiaoyu; Alcaraz, Cristina…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Community Detection Based on DeepWalk Model in Large-Scale Networks
By: Chen, Yunfang; Wang, Li; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
By: Zhou, Jie; Bai, Jian; Valenza, Fulvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology
By: Memon, Imran; Haq, Amin Ul; Shaukat, Sajjad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
BNRDT: When Data Transmission Meets Blockchain
By: Jin, Hongjian; Guo, Hui; Gan, Chenquan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
A Prediction Approach for Video Hits in Mobile Edge Computing Environment
By: Liu, Xiulei; Hou, Shoulu; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
Journal Articles
AKC-Based Revocable ABE Schemes from LWE Assumption
By: Cheng, Leixiao; Meng, Fei; Masucci, Barbara…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
PowerPrint: Identifying Smartphones through Power Consumption of the Battery
By: Chen, Jiong; Chen, Jing; Choo, Kim-Kwang Raymond…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes
By: Zhang, Bowen; Tondi, Benedetta; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Comprehensive Trust Model Based on Social Relationship and Transaction Attributes
By: Gong, Yonghua; Ma, Tinghuai; Sheng, Victor S.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Methods to Measure the Network Path Connectivity
By: Jiang, Guo-Ping; Wu, Meng; Zhu, Qingyi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
A Novel Approach to Transform Bitmap to Vector Image for Data Reliable Visualization considering the Image Triangulation and Color Selection
By: Han, Zhike; Wu, Xiuchao; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Deploying GIS Services into the Edge: A Study from Performance Evaluation and Optimization Viewpoint
By: Zhang, Jianbing; Ma, Bowen; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks
By: Tian, Miaoqing; Lu, Qian; Zhou, Xiaoyun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
Journal Articles
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol
By: Han, Yi Liang; Li, Yu; Anees, Amir…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Mimic Encryption Box for Network Multimedia Data Security
By: Zhou, Xiabing; Li, Bin; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-24, 24 p.
Journal Articles
Lattice-Based Linearly Homomorphic Signature Scheme over F2
By: Wang, Hao; Xu, Qiuliang; Xia, Zhihua…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
Journal Articles
MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection
By: Jeng, Tzung-Han; Chen, Yi-Ming; Afzal, Hammad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
Journal Articles
Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function
By: Hong, Deukjo; Nicopolitidis, Petros. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
An Improved Blockchain-Based Authentication Protocol for IoT Network Management
By: Yavari, Mostafa; He, Debiao; Chen, Chien-Ming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game
By: Liu, Xiaohu; Zhang, Yuchen; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Automatic Analysis Architecture of IoT Malware Samples
By: Carrillo-Mondejar, Javier; Castelo Gomez, Juan Manuel; Zhang, Yin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
A Mean Convolutional Layer for Intrusion Detection System
By: Mohammadpour, Leila; Ling, T.C.; Chen, Tom…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
High-Performance Routing Emulation Technologies Based on a Cloud Platform
By: Chen, Jianyu; Wang, Xiaofeng; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
Journal Articles
Research on Selection Method of Privacy Parameter ε
By: Sun, Pan Jun; Conti, Vincenzo. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
By: Lv, Na; Chen, Tianyu; Lin, Jingqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-1, 1 p.
Journal Articles
An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment
By: Math, Sa; Zhang, Lejun; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack
By: Zhang, Yuchen; Liu, Xiaohu; Genge, Bela…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Secure Communication Scheme Based on Equivalent Interference Channel Assisted by Physical Layer Secret Keys
By: Hu, Xiaoyan; Jin, Liang; Sciancalepore, Savio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage
By: Wang, Yaowei; Chen, Chen; Liu, Ximeng…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security
By: Zhang, Xi; Su, Ye; Peinado, A.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
On the Detection of a Non-Cooperative Beam Signal Based on Wireless Sensor Networks
By: Wei, Guofeng; Zhang, Bangning; Li, Xingwang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks
By: Tang, Fei; Huang, Dong; Zhang, Chunming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
A Novel Machine Learning-Based Approach for Security Analysis of Authentication and Key Agreement Protocols
By: Zahednejad, Behnam; Li, Jing; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Routing Strategy for LEO Satellite Networks Based on Membership Degree Functions
By: Wang, Juan; Yan, Xiaoyong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Improved Single-Key Attacks on 2-GOST
By: Zheng, Qiuhua; Wu, Ting; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Cyborgan OS: A Lightweight Real-Time Operating System for Artificial Organ
By: Li, Hong; Pan, Gang; Gao, Honghao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
By: Yao, Shimao; Sankar, Ravi; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Qualitative Analysis of Commercial Services in MEC as Phased-Mission Systems
By: Gong, Yuhuan; Xu, Xiaolong; Mo, Yuchang. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Comprehensive Survey on Local Differential Privacy
By: Li, Dan; Cai, Zhaohui; Niu, Xiaoguang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-29, 29 p.
Journal Articles
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques
By: Shen, Zhidong; Chen, Si; Coppolino, Luigi. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
A Privacy Risk Assessment Model for Medical Big Data Based on Adaptive Neuro-Fuzzy Theory
By: Jiang, Rong; Zhou, Wei; Liu, Sen…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism
By: Ma, Xin; Li, Haiying; Chen, Ming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
The Effect of the Primitive Irreducible Polynomial on the Quality of Cryptographic Properties of Block Ciphers
By: Shaukat Jamal, Sajjad; Shah, Dawood; Shah, Tariq…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Rational Protocols and Attacks in Blockchain System
By: Li, Tao; Wang, Yilei; Yang, Yixian…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Lightweight Crypto Stack for TPMS Using Lesamnta-LW
By: Watanabe, Yuhei; Yamamoto, Hideki; Mostarda, Leonardo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device
By: Zhao, Shijun; Feng, Wei; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone
By: Wang, Ziwang; Zhuang, Yi; Yan, Zujia…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
A Novel IM Sync Message-Based Cross-Device Tracking
By: Luo, Junzhou; Yang, Ming; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
«
1
2
3
4
5
6
7
8
9
10
»