e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(872)
Data Type
Journal Articles
(872)
Language
English
(872)
Country
Egypt
(872)
Authors / Persons
Xu, Xiaolong
(25)
Del Rey, Ángel Martín
(22)
Nicopolitidis, Petros
(22)
Maiorana, Emanuele
(21)
Galdi, Clemente
(18)
Megias, David
(17)
Maglaras, Leandros A.
(16)
Pan, Zhaoqing
(16)
Alazab, Mamoun
(15)
Díaz-Verdejo, Jesús
(15)
Gope, Prosanta
(15)
Qi, Lianyong
(15)
You, Ilsun
(15)
Conti, Vincenzo
(14)
Choo, Kim-Kwang Raymond
(13)
Genge, Bela
(13)
Li, Huaizhi
(13)
Yang, Qing
(13)
Cimato, Stelvio
(12)
Hu, Jiankun
(12)
Yan, Zheng
(12)
Anees, Amir
(11)
Li, Fagen
(11)
Cai, Z.
(10)
Di Pietro, Roberto
(10)
Khan, Muhammad Khurram
(10)
Zhang, Xuyun
(10)
Antonopoulos, Angelos
(9)
Caballero-Gil, Pino
(9)
Gao, Honghao
(9)
Xia, Zhihua
(9)
Liang, Kaitai
(8)
Yeh, Kuo-Hui
(8)
Zeadally, Sherali
(8)
Angin, Pelin
(7)
Chang, Chin-Chen
(7)
He, Debiao
(7)
Meng, Weizhi
(7)
Nazir, Shah
(7)
Qian, Zhenxing
(7)
Wang, Baocang
(7)
Wang, Jian
(7)
Del Rey, Angel M.
(6)
Du, Xiaojiang
(6)
D’Antonio, Salvatore
(6)
Kapron, Bruce M.
(6)
Liu, Zhe
(6)
Liu, Zhe-Li
(6)
Luo, Xiangyang
(6)
Wang, Wei
(6)
Yang, Geng
(6)
Huang, Cheng
(5)
Kim, Hyoungshick
(5)
Li, Hui
(5)
Li, Li
(5)
Li, Tao
(5)
Ma, Liran
(5)
Maglaras, Leandros
(5)
Masucci, Barbara
(5)
Mazurczyk, Wojciech
(5)
Palomar, Esther
(5)
Sciancalepore, Savio
(5)
Xu, Guoai
(5)
Yang, Yixian
(5)
Yuan, Yuan
(5)
Zhang, Hongqi
(5)
Zhang, Jie
(5)
Zhang, Xiaosong
(5)
Zhang, Yuchen
(5)
Zheng, Kangfeng
(5)
Zhuang, Yi
(5)
Alcaraz, Cristina
(4)
Cai, Zhipeng
(4)
Chen, Hefeng
(4)
Chen, Kefei
(4)
Chen, Thomas M.
(4)
Chen, Xingshu
(4)
Cogranne, Rémi
(4)
Dai, Hua
(4)
Geneiatakis, Dimitrios
(4)
Giri, Debasis
(4)
Harn, Lein
(4)
Jeong, Ik Rae
(4)
Jiang, Qi
(4)
Jung, Ki-Hyun
(4)
Kim, Kiseon
(4)
Li, Bin
(4)
Li, Tong
(4)
Li, Wenjia
(4)
Liu, Jiayong
(4)
Liu, Xiaolei
(4)
Lorenz, Pascal
(4)
Mahalik, Prem
(4)
Milutinovic, Veljko
(4)
Mostarda, Leonardo
(4)
Peinado, A.
(4)
Ping, Yuan
(4)
Qin, Jing
(4)
Ren, Jiadong
(4)
Shen, Jian
(4)
Show more
Update
Source
Security and Communication Networks
(872)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(872)
Range:
Search Results
(
401
-
450
of
872
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation
By: Guoyan, Huang; Qian, Wang; Hao, Xiaobing…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Integrity Audit of Shared Cloud Data with Identity Tracking
By: Yan, Yun Xue; Wu, Lei; Xu, Wen Yu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks
By: Zhang, Meiyu; Zhang, Qianying; Shi, Zhiping…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function
By: Byun, Jin Wook; Genge, Bela. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations
By: Xue, Mingfu; Wang, Jian; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
Journal Articles
Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems
By: Shang, Fute; Wang, Buhong; Katzenbeisser, Stefan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning
By: Ren, Jiadong; Chen, Jiageng; Huaizhi, Yan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment
By: Shen, Wenting; Qin, Jing; Ma, Jixin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning
By: Guo, Yuanbo; Angin, Pelin; Li, Tao…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System
By: Cabaj, Krzysztof; Gregorczyk, Marcin; Ksiezopolski, Bogdan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-22, 22 p.
Journal Articles
Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase
By: Luckner, Marcin; Kozik, Rafał. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN
By: Caprolu, Maurantonio; Raponi, Simone; Antonopoulos, Angelos…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
By: Hu, Teng; Niu, Weina; Zhang, Xiaosong…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
Efficient Ciphertext-Policy Attribute-Based OnlineOffline Encryption with User Revocation
By: Ma, Haiying; Wang, Zhanjun; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS
By: Wang, JingJing; Han, YiLiang; Yang, XiaoYuan…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-14, 14 p.
Journal Articles
Efficient Extraction of Network Event Types from NetFlows
By: Sourek, Gustav; Zelezny, Filip; Keller, Jörg. Security and Communication Networks. No. 2019 (2019), pp.1-18, 18 p.
Journal Articles
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning
By: Zhao, Yuntao; Bo, Bo; Feng, Yongxin…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
Blind Image Watermarking Based on Adaptive Data Spreading in n-Level DWT Subbands
By: Seo, Young-Ho; Kim, Dong-Wook; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Virtual Network Embedding Based on Security Level with VNF Placement
By: Dwiardhika, Dhanu; Tachibana, Takuji; Kotulski, Zbigniew. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
A Comparative Study of JASO TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design
By: Kawanishi, Yasuyuki; Nishihara, Hideaki; Souma, Daisuke…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-35, 35 p.
Journal Articles
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things
By: Darong, Huang; Zhang, Xuyun; Wan, Shaohua…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-16, 16 p.
Journal Articles
Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks
By: Acarali, Dilara; Rajarajan, Muttukrishnan; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image
By: Ma, Bin; Li, Bing; Wang, Xiao-Yu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
By: Truong, Toan-Thinh; Tran, Minh-Triet; Palomar, Esther…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Tightly Secure Lossy Trapdoor Functions: Constructions and Applications
By: Qin, Baodong; Martínez Pérez, Gregorio. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks
By: Niu, Xinxin; Zheng, Kangfeng; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization
By: Abbasi, Rashid; Xu, Lixiang; Megias, David…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Image Encryption with Double Spiral Scans and Chaotic Maps
By: Tang, Zhenjun; Zhang, Xianquan; Del Rey, Ángel Martín…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-15, 15 p.
Journal Articles
An Explainable Password Strength Meter Addon via Textual Pattern Recognition
By: Xu, Ming; Galdi, Clemente; Han, Weili. Security and Communication Networks. No. 2019 (2019), pp.1-10, 10 p.
Journal Articles
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
By: Zhang, Daode; Li, Jie; D’Antonio, Salvatore…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-12, 12 p.
Journal Articles
FPGA Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform
By: Hajjaji, Mohamed Ali; Gafsi, Mohamed; Mtibaa, Abdellatif…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-17, 17 p.
Journal Articles
Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier
By: Cai, Z.; Su, Jinshu; Su, Chunhua…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Differentially Private Release of the Distribution of Clustering Coefficients across Communities
By: Li, Xiaoye; Yang, Jing; Zhang, Jianpei…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-9, 9 p.
Journal Articles
A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis
By: Wen, Junhao; Wang, Xibin; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-11, 11 p.
Journal Articles
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
By: Komano, Yuichi; Sakiyama, Kazuo; Iwamoto, Mitsugu…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks
By: Oliveira, Guilherme; Fernández, Evelio; Mafra, Samuel…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks
By: Ngo, Duc-Minh; Pham-Quoc, Cuong; Ngoc Thinh, Tran…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm
By: Zhao, Xiufeng; Angin, Pelin; Wang, Ailan. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”
By: Qiang, Weizhong; Wang, Shizhen; Jin, Hai…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-1, 1 p.
Journal Articles
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection
By: Kozik, Rafał; Pawlicki, Marek; Choraś, Michał…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-8, 8 p.
Journal Articles
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping
By: Zhao, Xiufeng; Pan, Zhaoqing; Zhang, Bo…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT
By: Liu, Xuefei; Zhang, Chao; Zhang, Xuyun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-10, 10 p.
Journal Articles
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes
By: Wang, Xun; Luo, Tao; Hu, Jiankun…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment
By: Yang, Ming; Yuan, Yuan; Ling, Zhen…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-15, 15 p.
Journal Articles
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels
By: Tran, Phuong T.; Voznak, Miroslav; Geneiatakis, Dimitrios…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis
By: Nguyen, Thanh H.; Wright, Mason; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-28, 28 p.
Journal Articles
Robust Visual Secret Sharing Scheme Applying to QR Code
By: Tan, Longdan; Liu, Kesheng; Xiong, Naixue…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-12, 12 p.
Journal Articles
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks
By: Wang, Qi; Gómez-Skarmeta, Antonio F.; Nicopolitidis, Petros…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-21, 21 p.
Journal Articles
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients
By: Kricha, Zied; Sakly, Anis; Maiorana, Emanuele…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
Asynchronous Group Authentication Based on Geometric Approach
By: Wang, Hong; Li, Jianhua; Di Pietro, Roberto…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-9, 9 p.
«
4
5
6
7
8
9
10
11
12
13
»