e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
101
-
150
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Feature Selection Based on Cross-Correlation for the Intrusion Detection System
By: Farahani, Gholamreza; Mostarda, Leonardo. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
Journal Articles
A Robust Image Watermarking Approach Using Cycle Variational Autoencoder
By: Wei, Qiang; Wang, Hu; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
By: Adnan, Muhammad; Nazir, Shah; Anees, Amir…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities
By: Zhang, Xulong; Zhu, Qingyi; Song, Xiaoxia. Security and Communication Networks. No. 2020 (2020), pp.1-7, 7 p.
Journal Articles
Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries
By: Sancho, Jorge; García, José; Maglaras, Leandros…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment
By: Liu, Anqi; Yang, Maobin; Zhang, Chunming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Secrecy Analysis of Cognitive Radio Networks over Generalized Fading Channels
By: Sun, Jiangfeng; He, Pengfei; Xu, Lingwei…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Impossible Differential Distinguishers of Two Generalized Feistel Structures
By: Ma, Wenping; Yang, Luxing; Zheng, Linfeng…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks
By: Zou, Ying; Wang, Lei; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Private Function Evaluation Using Intel’s SGX
By: Selo, Omar Abou; Rachid, Maan Haj; Malluhi, Qutaibah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
A Study on the Optimization of Blockchain Hashing Algorithm Based on PRCA
By: Si, Xueming; Yuan, Chao; Yuan, Yuan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey
By: Xu, Zhanyang; Liu, Wentao; Wanchun, Dou…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview
By: Nazir, Shah; Anees, Amir; Alharbi, Abdullah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Practical CCA-Secure Functional Encryptions for Deterministic Functions
By: Wang, Huige; Chen, Kefei; Liang, Kaitai…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment
By: Jiang, Jielin; Tian, Yuan; Al-Nabhan, Najla…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Collaborative Intelligence: Accelerating Deep Neural Network Inference via Device-Edge Synergy
By: Shan, Nanliang; Ye, Zecong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
On WPA2-Enterprise Privacy in High Education and Science
By: Perković, T.; Dagelić, A.; Bugarić, M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Game Theoretical Method for Anomaly-Based Intrusion Detection
By: Xu, Guoai; Zhang, Miao; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising
By: Li, Tenghui; Zhuang, Yi; Dong, Shoubin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
An Improved Elman Network for Stock Price Prediction Service
By: Liu, Bo; Wu, Qilin; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
An Antiforensic Method against AMR Compression Detection
By: Li, Xiaowen; Dong, Li; Wang, Rangding…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Enhancing Transaction Security for Handling Accountability in Electronic Health Records
By: Techapanupreed, Chian; Nicopolitidis, Petros; Kurutach, Werasak. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains
By: Huang, Qinglong; Xiao, Fu; Wang, Wenming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
Journal Articles
Efficient Private Set Intersection Using Point-Value Polynomial Representation
By: Ruan, Ou; Del Rey, Angel M.; Mao, Hao. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Secure Framework Enhancing AES Algorithm in Cloud Computing
By: Shiraz, Muhammad; Akhtar, Rizwan; Ditta, Allah…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Characterizing Anomalies in Malware-Generated HTTP Traffic
By: Białczak, Piotr; Mazurczyk, Wojciech; Galdi, Clemente. Security and Communication Networks. No. 2020 (2020), pp.1-26, 26 p.
Journal Articles
Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method
By: Huang, Xucheng; Anees, Amir; Nazir, Shah. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Dynamic Privacy Protection Mechanism for Spatiotemporal Crowdsourcing
By: Tong, Xiangrong; Zhao, Jindong; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System
By: Sun, Pengfei; Li, Qi; Wu, Huaming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Dynamic Security Exchange Scheduling Model for Business Workflow Based on Queuing Theory in Cloud Computing
By: Wu, Jianguo; Cheng, Yongliang; Liu, Zhiqiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey
By: Wu, Yirui; Wei, Dabao; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-17, 17 p.
Journal Articles
Android Malware Detection Based on a Hybrid Deep Learning Model
By: Lu, Tianliang; Du, Yanhui; Khokhar, Umar M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Certificateless Noninteractive Key Exchange Protocol with Provable Security
By: Cao, Xuefei; You, Wei; Liang, Kaitai…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication
By: Hong, Cheng; Anees, Amir; Khan, Sulaiman…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Knocking on IPs: Identifying HTTPS Websites for Zero-Rated Traffic
By: Di Martino, Mariano; Quax, Peter; Lamotte, Wim…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Toward Serverless and Efficient Encrypted Deduplication in Mobile Cloud Computing Environments
By: Shin, Youngjoo; Hur, Junbeom; Koo, Dongyoung…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation
By: Li, Li; Liu, Jiayong; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Packet-Based Intrusion Detection Using Bayesian Topic Models in Mobile Edge Computing
By: Cao, Xuefei; Xu, Xiaolong; Chen, Bo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Risk Situation Assessment Model Based on Interdomain Interaction in Cloud Computing Environment
By: Wang, Gaocai; Yu, Ning; Maglaras, Leandros. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network
By: Guo, Junyan; Du, Ye; Del Rey, Angel M.. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
The Defense of Adversarial Example with Conditional Generative Adversarial Networks
By: Yu, Fangchao; Wang, Li; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
By: Truong, Toan-Thinh; Tran, Minh-Triet; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-21, 21 p.
Journal Articles
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
By: Sun, Pan Jun; Maglaras, Leandros. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
A Task Offloading Method with Edge for 5G-Envisioned Cyber-Physical-Social Systems
By: Jiang, Jielin; Zhang, Xing; Wanchun, Dou…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning
By: El Kamel, Nadiya; Touahni, Raja; Shaukat, Sajjad…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes
By: Liu, Yuan; Shen, Xiaoying; Li, Lixiang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Limiting Privacy Breaches in Average-Distance Query
By: Xia, Huihua; Xiong, Yan; Aziz, Benjamin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-24, 24 p.
Journal Articles
A Survey of Key Technologies for Constructing Network Covert Channel
By: Xiong, Gang; Li, Zhen; Mostarda, Leonardo…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
Journal Articles
An Efficient and Effective Approach for Flooding Attack Detection in Optical Burst Switching Networks
By: Almaslukh, Bandar; Amjad, Muhammad Faisal. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Systematic Approach for Cybersecurity Design of In-Vehicle Network Systems with Trade-Off Considerations
By: Yu, Jinghua; Abdelwahed, Sherif; Luo, Feng. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
«
1
2
3
4
5
6
7
8
9
10
»