Found: 286
Select item for more details and to access through your institution.
Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9065856
- By:
- Publication type:
- Article
Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”.
- Published in:
- 2018
- By:
- Publication type:
- Correction Notice
Generalized Bootstrapping Technique Based on Block Equality Test Algorithm.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9325082
- By:
- Publication type:
- Article
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8753870
- By:
- Publication type:
- Article
Analysis on Matrix GSW-FHE and Optimizing Bootstrapping.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6362010
- By:
- Publication type:
- Article
Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1635081
- By:
- Publication type:
- Article
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6124160
- By:
- Publication type:
- Article
On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6036087
- By:
- Publication type:
- Article
A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8706940
- By:
- Publication type:
- Article
Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2864873
- By:
- Publication type:
- Article
Robust Visual Secret Sharing Scheme Applying to QR Code.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4036815
- By:
- Publication type:
- Article
5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9291506
- By:
- Publication type:
- Article
A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1254081
- By:
- Publication type:
- Article
Asynchronous Group Authentication Based on Geometric Approach.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5289383
- By:
- Publication type:
- Article
Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9065424
- By:
- Publication type:
- Article
DR-Net: A Novel Generative Adversarial Network for Single Image Deraining.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7350324
- By:
- Publication type:
- Article
An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3421725
- By:
- Publication type:
- Article
Applied Cryptography and Noise Resistant Data Security.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3962821
- By:
- Publication type:
- Article
Covert Communication Networks in Hostile Environments.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2731859
- By:
- Publication type:
- Article
Construction of a New Biometric-Based Key Derivation Function and Its Application.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6107912
- By:
- Publication type:
- Article
Use of Data Visualisation for Zero-Day Malware Detection.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1728303
- By:
- Publication type:
- Article
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1420930
- By:
- Publication type:
- Article
GANs Based Density Distribution Privacy-Preservation on Mobility Data.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9203076
- By:
- Publication type:
- Article
Identity-Based Proxy Signcryption Protocol with Universal Composability.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9531784
- By:
- Publication type:
- Article
Practical Suitability and Experimental Assessment of Tree ORAMs.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2138147
- By:
- Publication type:
- Article
Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6459326
- By:
- Publication type:
- Article
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2615249
- By:
- Publication type:
- Article
A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5432960
- By:
- Publication type:
- Article
Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3809462
- By:
- Publication type:
- Article
Research on Plaintext Restoration of AES Based on Neural Network.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6868506
- By:
- Publication type:
- Article
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5051270
- By:
- Publication type:
- Article
Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/5783976
- By:
- Publication type:
- Article
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/8392080
- By:
- Publication type:
- Article
A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3210207
- By:
- Publication type:
- Article
A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9583982
- By:
- Publication type:
- Article
A Novel Blind and Robust Video Watermarking Technique in Fast Motion Frames Based on SVD and MR-SVD.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6712065
- By:
- Publication type:
- Article
Network Intrusion Detection Method Based on PCA and Bayes Algorithm.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1914980
- By:
- Publication type:
- Article
A Balanced Trust-Based Method to Counter Sybil and Spartacus Attacks in Chord.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4963932
- By:
- Publication type:
- Article
Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2506319
- By:
- Publication type:
- Article
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/9802475
- By:
- Publication type:
- Article
A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2462901
- By:
- Publication type:
- Article
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6829326
- By:
- Publication type:
- Article
System to Safeguard the Identity of Persons in Photographs through Cryptography and Steganography Techniques Using Chaos.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4853134
- By:
- Publication type:
- Article
Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6315039
- By:
- Publication type:
- Article
Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/6563089
- By:
- Publication type:
- Article
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4248092
- By:
- Publication type:
- Article
ID-Based Public Auditing Protocol for Cloud Data Integrity Checking with Privacy-Preserving and Effective Aggregation Verification.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3205898
- By:
- Publication type:
- Article
Test Sequence Reduction of Wireless Protocol Conformance Testing to Internet of Things.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/3723691
- By:
- Publication type:
- Article
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/2193897
- By:
- Publication type:
- Article
Towards a Secure and Borderless Collaboration between Organizations: An Automated Enforcement Mechanism.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/1572812
- By:
- Publication type:
- Article