e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
151
-
200
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks
By: Pratomo, Baskoro A.; Burnap, Pete; Theodorakopoulos, George…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Mobile IPv6 Vertical Handover Specifications, Threats, and Mitigation Methods: A Survey
By: Firmansyah, Teguh; Alaydrus, Mudrik; Valenza, Fulvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-18, 18 p.
Journal Articles
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model
By: Hao, Wangli; Zhao, Shanshan; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Multifault Diagnosis Method of Gear Box Running on Edge Equipment
By: Zhao, Xiao-ping; Zhang, Yong-hong; Wanchun, Dou…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid
By: Wang, Liangliang; Wen, Mi; Zhang, Yin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-20, 20 p.
Journal Articles
Accurate Computation of Fractional-Order Exponential Moments
By: Xu, Shujiang; Hao, Qixian; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing
By: Hosseini Beghaeiraveri, Seyed Amir; Rezvani, Mohsen; Li, Huaizhi…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
A Minimum Defense Cost Calculation Method for Attack Defense Trees
By: Xu, Bingfeng; Zhong, Zhicheng; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Distributed Security Framework for Reliable Threat Intelligence Sharing
By: Preuveneers, Davy; Joosen, Wouter; Saxena, Neetesh…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Survey on Services Provision and Distribution of Official and Commercial Intellectual Property Platforms
By: Wang, Yang; Gui, Haijin; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering
By: Niu, Weina; Liu, Liang; Li, Kai…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques
By: Zhao, Jing; Cao, Ting; Wang, Kan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Noninteractive Lightweight Privacy-Preserving Auditing on Images in Mobile Crowdsourcing Networks
By: Zhang, Juan; Zhang, Chunyu; Guo, Xiaojun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map
By: Liu, Hui; Zou, Jianwen; Liu, Yifan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
By: Almohri, Hussain M. J.; Almutawa, Mohammad; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon
By: Koo, Bonwook; Jung, Younghoon; Kim, Woo-Hwan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection
By: Aljably, Randa; Tian, Yuan; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Efficient Searchable Symmetric Encryption Supporting Dynamic Multikeyword Ranked Search
By: Zhang, Yu; Li, Yin; Wang, Yifan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEMIDS Systems
By: Moukafih, Nabil; Orhanou, Ghizlane; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Evaluator: A Multilevel Decision Approach for Web-Based Landmark Evaluation
By: Yang, Wen; Liu, Xiaonan; Luo, Xiangyang…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Systematic Literature Review on Using Machine Learning Algorithms for Software Requirements Identification on Stack Overflow
By: Ahmad, Arshad; Nazir, Shah; Hussain, Iqtadar…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
Journal Articles
Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem
By: Li, Xiaoping; Liu, Yanjun; Yeh, Kuo-Hui…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Cryptanalysis and Improvement of a Group Authentication Scheme with Multiple Trials and Multiple Authentications
By: Xia, Zhe; Liu, Yining; Chang, Chin-Chen…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-8, 8 p.
Journal Articles
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
By: So, Jaewoo; Khokhar, Umar M.. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Deep Autoencoders and Feedforward Networks Based on a New Regularization for Anomaly Detection
By: Albahar, Marwan Ali; Maglaras, Leandros; Binsawad, Muhammad. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
By: Nazir, Shah; Khan, Habib Ullah; Anees, Amir…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-6, 6 p.
Journal Articles
An Encrypted Traffic Identification Scheme Based on the Multilevel Structure and Variational Automatic Encoder
By: Zhai, Jiangtao; Wang, Mingqian; Tian, Yuan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
A Multimode Network Steganography for Covert Wireless Communication Based on BitTorrent
By: Wang, Mingqian; Gu, Weijie; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach
By: Nusenu, Shaddrack Yaw; Hu, Jiankun. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Modelling Features-Based Birthmarks for Security of End-to-End Communication System
By: Shahzad, Sara; Amin, Rohul; Hussain, Iqtadar…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
VoNR-IPD: A Novel Timing-Based Network Steganography for Industrial Internet
By: Cao, Shuai; Wang, Yunliang; Pan, Zhaoqing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
By: Zhou, Yousheng; Alazab, Mamoun; Wang, Longan. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
Journal Articles
Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model
By: Guo, Yuyan; Yu, Lei; Wei, Shimin…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Secure Multiusers Directional Modulation Scheme Based on Random Frequency Diverse Arrays in Broadcasting Systems
By: Yuan, Zhaohui; Qiu, Bin; Zhou, Jing…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields
By: Li, Xingran; Yu, Wei; Li, Bao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Research on SKINNY Optimal Differential Trail Search
By: Liu, Shaoqiang; Peng, Chaiyang; Del Rey, Angel M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Warehouse-Oriented Optimal Path Planning for Autonomous Mobile Fire-Fighting Robots
By: Liu, Yong-tao; Sun, Ruizhi; Xu, Xiaolong…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Abnormal User Detection Based on the Correlation Probabilistic Model
By: Yang, Xiaohui; Li, Wenjia; Sun, Ying. Security and Communication Networks. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
SecureBP from Homomorphic Encryption
By: Zhou, Shuai; Wang, Kunpeng; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services
By: Zhang, Hongli; Yu, Xiangzhan; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA
By: Cano, Maria-Dolores; Cañavate-Sanchez, Antonio; Sha, Kewei. Security and Communication Networks. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model
By: Tan, Jinglei; Lei, Cheng; Hu, Hao…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Study on Stochastic Differential Game Model in Network Attack and Defense
By: Wang, Gaocai; Hu, Jintian; Lu, Yuting…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service
By: Lee, Kyungroul; Lee, Sun-Young; Alcaraz, Cristina…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
Decentralized Private Information Sharing Protocol on Social Networks
By: Kumari, Saru; Rodrigues, Joel J. P. C.; Chen, Chien-Ming…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm
By: Jiao, Kaixin; Huang, Xiaoling; Del Rey, Angel M.…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
On-Device Detection of Repackaged Android Malware via Traffic Clustering
By: He, Gaofeng; Zhang, Lu; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-19, 19 p.
Journal Articles
Using FDAD to Prevent DAD Attack in SEcure Neighbor Discovery Protocol
By: Wang, Hui; Nicopolitidis, Petros; Liu, Fuquan…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design
By: Lu, Jiqiang; Seo, Hwajung; Liang, Kaitai. Security and Communication Networks. No. 2020 (2020), pp.1-26, 26 p.
Journal Articles
Research and Implementation on Power Analysis Attacks for Unbalanced Data
By: Fan, Xiaohong; Li, Xiuying; Ding, Ding…[et al.]. Security and Communication Networks. No. 2020 (2020), pp.1-10, 10 p.
«
1
2
3
4
5
6
7
8
9
10
»