e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
301
-
350
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications
By: Han, Bo; Yin-Liang, Zhao; Zhang, Kuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network
By: Lai, Yingxu; Zhang, Jingwen; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Privacy Protection of Social Networks Based on Classified Attribute Encryption
By: Huang, Hai-ping; Fu, Xiong; Wang, Ru-chuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Power Grid Estimation Using Electric Network Frequency Signals
By: Bang, Woorim; Yoon, Ji Won; Schrittwieser, Sebastian. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators’ Self-Assessment Errors
By: Kamola, Mariusz; Galdi, Clemente. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
Detection of Free-Form Copy-Move Forgery on Digital Images
By: Ulutas, Guzin; Ulutas, Mustafa; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Automatic Identification of Honeypot Server Using Machine Learning Techniques
By: Huang, Cheng; Han, Jiaxuan; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
A Malware and Variant Detection Method Using Function Call Graph Isomorphism
By: Bai, Jinrong; Shi, Qibin; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Generative Reversible Data Hiding by Image-to-Image Translation via GANs
By: Zhang, Zhuo; Fu, Guangyuan; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Evaluating the Impact of Name Resolution Dependence on the DNS
By: Xu, Haiyan; Zhang, Zhaoxin; Schrittwieser, Sebastian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
A Data-Driven Approach to Cyber Risk Assessment
By: Baldi, Marco; Chiaraluce, Franco; Kim, Hyoungshick…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
A Novel Trust Model Based on Node Recovery Technique for WSN
By: Qi, Ping; Wang, Fucheng; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks
By: Gao, Yunpeng; Song, Houbing; Zhang, Nan. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
By: Emura, Keita; Hanaoka, Goichiro; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-36, 36 p.
Journal Articles
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
By: Wang, Feifei; Xu, Guoai; Gu, Lize…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection
By: Zheng, Kangfeng; Wu, Chunhua; Yang, Yixian…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT
By: Yin, Mingyong; Chen, Xingshu; Wang, Wei…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization
By: Adebayo, Olawale Surajudeen; Gimenez-Guzman, Jose Manuel; Abdul Aziz, Normaziah. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Comprehensive Risk Identification Model for SCADA Systems
By: Elhady, Abdelghafar M.; El-bakry, Hazem; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-24, 24 p.
Journal Articles
Detecting Shilling Attacks with Automatic Features from Multiple Views
By: Zhao, Qingshan; Cao, Jianfang; Díaz-Verdejo, Jesús…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Linear ( t , n ) Secret Sharing Scheme with Reduced Number of Polynomials
By: Phiri, Kenan Kingsley; Kim, Hyunsung; Hussain, Mehdi. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention
By: Iraqi, Omar; El Bakkali, Hanan; Calzavara, Stefano. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags
By: Khalid, Madiha; Nicopolitidis, Petros; Najam-Ul-Islam, Muhammad…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-25, 25 p.
Journal Articles
Comment on “Quantum-to-the-Home: Achieving Gbitss Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment”
By: Qu, Zhen; Djordjevic, Ivan B.; Armknecht, Frederik. Security and Communication Networks. No. 2019 (2019), pp.1-1, 1 p.
Journal Articles
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant
By: Wang, Jin; Sangaiah, Arunkumar; Jung, Ki-Hyun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
ID-Based Strong Designated Verifier Signature over R-SIS Assumption
By: Zheng, Zhihua; Xu, Qiuliang; Galdi, Clemente…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
A Novel Method for Location Privacy Protection in LBS Applications
By: Lu, Dan; Han, Qilong; Zhang, Kejia…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Security Requirements Engineering in Safety-Critical Railway Signalling Networks
By: Heinrich, Markus; Vateva-Gurova, Tsvetoslava; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN)
By: Albakri, Ashwag; Harn, Lein; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users
By: Feng, Bo; Li, Qiang; Genge, Bela…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
A Distributed Access Control with Outsourced Computation in Fog Computing
By: Wang, Qihua; Wang, Huaqun; Gope, Prosanta…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things
By: Zheng, Dong; Li, Fagen; Qin, Baodong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
Efficient Cancelable Iris Template Generation for Wearable Sensors
By: Jeong, Jae Yeol; Jeong, Ik Rae; Maiorana, Emanuele. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
An Approach Enabling Various Queries on Encrypted Industrial Data Stream
By: Wang, Tao; Yang, Bo; Harn, Lein…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Recent Advancements in Intrusion Detection Systems for the Internet of Things
By: Khan, Zeeshan Ali; Alcaraz Calero, Jose M.; Herrmann, Peter. Security and Communication Networks. No. 2019 (2019), pp.1-19, 19 p.
Journal Articles
Random Fault Attacks on a Class of Stream Ciphers
By: Bartlett, Harry; Dawson, Ed; Conti, Vincenzo…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
A Hyperchaotic Color Image Encryption Algorithm and Security Analysis
By: Zhao, Fangzheng; Zhang, Jie; Cimato, Stelvio…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification
By: Xu, Dawen; Megias, David; Su, Shubing. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
A Secure Data Sharing Scheme with Designated Server
By: Zhu, Binrui; Ma, Jixin; Yeh, Kuo-Hui…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
Fingerprint Protected Password Authentication Protocol
By: Yang, Chao; Yang, Li; Ma, Jianfeng…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems
By: Thwin, Thein Than; Vasupongayya, Sangsuree; Gope, Prosanta. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
By: Wang, Feifei; Xu, Guoai; Wang, Chenyu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
A Novel Device Identification Method Based on Passive Measurement
By: Sun, Wei; Jiang, Jianguo; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
By: Kholidy, Hisham A.; Erradi, Abdelkarim; Ranchal, Rohit. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms
By: Ren, Jiadong; Hu, Jing-jing; Alazab, Mamoun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Integrating Traffics with Network Device Logs for Anomaly Detection
By: Zhuo, Zhongliu; Hu, Teng; Angin, Pelin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Security Cryptanalysis of NUX for the Internet of Things
By: Liu, Yu; Liu, Xiaolei; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information
By: Pan, Zhisong; Guo, Shize; Ranchal, Rohit…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach
By: Yang, Lu-Xing; Yang, Xiaofan; Tang, Yuan Yan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
By: Zhan, Yu; Wang, Baocang; Megias, David. Security and Communication Networks. No. 2019 (2019), pp.1-5, 5 p.
«
2
3
4
5
6
7
8
9
10
11
»