e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
251
-
300
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing
By: Zeng, Jianping; Wu, Shuang; Caballero-Gil, Pino…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning
By: Zhang, Yuchen; Namin, Akbar S.; Liu, Jing. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis
By: Han, Mee Lan; Kwak, Byung Il; Kim, Huy Kang…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
Journal Articles
F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms
By: Lin, Guofeng; Xia, Yunhao; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Cryptanalysis of the Lightweight Block Cipher BORON
By: Liang, Huicong; Conti, Vincenzo; Wang, Meiqin. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard
By: Rizwan, Muhammad; Maglaras, Leandros A.; Ahmad, Fahad…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
By: Mo, Jiaqing; Genge, Bela; Chen, Hang. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
Journal Articles
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model
By: Lai, Yingxu; Liu, Jing; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks
By: Li, Quanrun; Hsu, Chingfang; He, Debiao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Novel Meaningful Image Encryption Based on Block Compressive Sensing
By: Huang, Xiaoling; Zhou, Junwei; Milutinovic, Veljko…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security
By: Shahzad, Imran; Razaq, Abdul; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification
By: Gao, Hui; Chen, Yunfang; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Active Defense Strategy Selection Method Based on Two-Way Signaling Game
By: Liu, Xiaohu; Zhang, Heng-wei; Zhang, Yuchen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Estimating the Relative Speed of RF Jammers in VANETs
By: Kosmanos, Dimitrios; Argyriou, Antonios; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
Journal Articles
Session-Based Webshell Detection Using Machine Learning in Web Logs
By: Wu, Yixin; Huang, Cheng; Schrittwieser, Sebastian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks
By: Benisha, R. B.; Gope, Prosanta; Raja Ratna, S.. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping
By: Gu, Dawu; Jin, Chenhui; Guan, Jie…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
Journal Articles
Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in SDN Environments
By: Albahar, Marwan Ali; Li, Huaizhi. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol
By: Xu, Yibin; Huang, Yangyu; Milutinovic, Veljko. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection
By: Hu, Langtao; Zheng, Xin; Sorce, Salvatore…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions
By: Pedone, Ignazio; Lioy, Antonio; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Analysis of DES Plaintext Recovery Based on BP Neural Network
By: Fan, Sijie; Sousa, Leonel; Zhao, Yaqun. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
Journal Articles
A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code
By: Yu, Bin; Fu, Zhengxin; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD
By: Čeponis, Dainius; Kim, Hyoungshick; Goranin, Nikolaj. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
An API Semantics-Aware Malware Detection Method Based on Deep Learning
By: Ma, Xin; Pan, Zhisong; Li, Wenjia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels
By: Karimi Rizi, A.; Nematbakkhsh, Naser; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-23, 23 p.
Journal Articles
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic
By: Niu, Weina; Li, Ting; Zhang, Xiaosong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
An Indistinguishably Secure Function Encryption Scheme
By: Zhang, Ping; Liu, Muhua; Sousa, Leonel…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
By: Wang, Dong; Zhang, Xiaosong; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-19, 19 p.
Journal Articles
Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis
By: Xu, Yahong; Yang, Geng; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
A Novel Construction of Constrained Verifiable Random Functions
By: Liu, Muhua; Zhang, Ping; Wu, Qingtao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images
By: Kim, Pyung-Han; Giri, Debasis; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs
By: Liang, Kaitai; Yang, Bo; Gringoli, Francesco…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method
By: Tang, Junwei; Nicopolitidis, Petros; Xu, Zhiyong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-20, 20 p.
Journal Articles
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition
By: Zhang, ShuaiWei; Yang, XiaoYuan; Agosta, Giovanni…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems
By: Wang, Jun; Luo, Feixiang; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Corrigendum to “Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”
By: Asif, Rameez; Buchanan, William J.. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
Journal Articles
An Analysis of DDoS Attacks on the Instant Messengers
By: Faisal, Mohammad; Abbas, Sohail; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
VPN Traffic Detection in SSL-Protected Channel
By: Zain ul Abideen, Muhammad; Saleem, Shahzad; Soundrapandiyan, Rajkumar…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
Journal Articles
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks
By: Wang, Weiping; Zhang, Shigeng; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs
By: Pan, Jiaye; Zhuang, Yi; Nepal, Surya…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-22, 22 p.
Journal Articles
A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem
By: Rantos, Konstantinos; Drosatos, George; Genge, Bela…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data
By: Chen, Hefeng; Chang, Chin-Chen; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-7, 7 p.
Journal Articles
A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms
By: Song, Baek Kyung; Cimato, Stelvio; Yoon, Ji Won…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis
By: Choi, Mi-Jung; Kim, Hajin; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in SDN
By: Yu, Haisheng; Li, Keqiu; Chen, Thomas M.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Smart Detection: An Online Approach for DoSDDoS Attack Detection Using Machine Learning
By: Lima Filho, Francisco Sales de; Silveira, Luiz F. Q.; Maglaras, Leandros A.…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Multidivisible OnlineOffline Cryptography and Its Application to Signcryptions
By: Yamamoto, Dan; Kapron, Bruce M.; Ogata, Wakaha. Security and Communication Networks. No. 2019 (2019), pp.1-21, 21 p.
Journal Articles
LTE Phone Number Catcher: A Practical Attack against Mobile Privacy
By: Yu, Chuan; Cai, Z.; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis
By: Kim, Daegeon; Kim, Huy Kang; Nepal, Surya. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
«
1
2
3
4
5
6
7
8
9
10
»