Security and Privacy

短名
Journal Impact1.30
国际分区TELECOMMUNICATIONS(Q3)
ISSN2475-6725
h-index

期刊主页
涉及主题计算机科学计算机安全操作系统数学政治学法学计算机网络工程类人工智能万维网互联网隐私程序设计语言业务
出版信息出版商: Wiley出版周期: 期刊类型: journal
基本数据创刊年份: 原创研究文献占比95.29%自引率:6.70%Gold OA占比: 10.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

An Encryption Algorithm Based on Public‐Key Cryptosystems for Vector Map

2024-9-13

Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics

2024-9-13

Promise of Zero‐Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions

2024-9-12

An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV

2024-9-5

Issue Information

2024-9-1

Advanced hybrid malware identification framework for the <scp>Internet of Medical Things</scp>, driven by deep learning

2024-8-26

Guided and unguided approaches for quantum key distribution for secure quantum communication

2024-8-24

Uncovering security vulnerabilities through multiplatform malware analysis

2024-8-19

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

2024-8-14

<scp>PIoT</scp>‐fortifying <scp>IoT</scp> device identity and data access: A security framework empowered by blockchain

2024-8-9

A blockchain‐based trusted vehicle service recommendation scheme in intelligent transport systems

2024-8-7

A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks

2024-8-5

A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs

2024-8-5

<scp>IoT</scp> malware detection using static and dynamic analysis techniques: A systematic literature review

2024-7-19

An approach for mitigating cognitive load in password management by integrating QR codes and steganography

2024-7-16

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

2024-7-14

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review

2024-7-12

Research on privacy leakage of celebrity's ID card number based on real‐name authentication

2024-7-11

A differential privacy aided DeepFed intrusion detection system for IoT applications

2024-7-10

Dark patterns: <scp>EU</scp>'s regulatory efforts

2024-7-7

An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions

2024-7-4

Enhancing agricultural wireless sensor network security through integrated machine learning approaches

2024-7-2

Issue Information

2024-7-1

On the trade‐off between rate and reliability for secret key generation in wireless channels

2024-6-30

A modified <scp>RC</scp>‐4 cryptosystems to enhance security by using negative key schedule

2024-6-29

Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and <scp>DNA</scp> coding

2024-6-27

Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach

2024-6-20

Blockchain‐based federated learning approaches in internet of things applications

2024-6-18

Detection of Covid‐19 disease by using privacy‐aware artificial intelligence system

2024-6-18

A trust distributed learning (D‐NWDAF) against poisoning and byzantine attacks in B5G networks

2024-6-18

Trajectory tracking attack for vehicular ad‐hoc networks

2024-6-18

SecureCare: A blockchain‐assisted wearable body area network for secure and scalable IoT healthcare services

2024-6-9

Detection of malicious smart contracts by fine‐tuning GPT‐3

2024-6-9

Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature

2024-6-7

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

2024-6-7

Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities

2024-6-7

A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment

2024-6-5

Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection

2024-6-5

Intelligent privacy‐preserving data management framework for medicine supply chain system

2024-5-28

Browser‐in‐the‐middle attacks: A comprehensive analysis and countermeasures

2024-5-28

Kafka‐Shield: Kafka Streams‐based distributed detection scheme for IoT traffic‐based DDoS attacks

2024-5-21

A novel Bayesian optimizable ensemble bagged trees model for cryptocurrency fraud prediction approach

2024-5-19

Preserving location‐query privacy in location‐based services: A review

2024-5-15

<scp>PRC6</scp>: Hybrid lightweight cipher for enhanced cloud data security in parallel environment

2024-5-14

Short message encryption technology of <scp>Beidou</scp> communication based on <scp>SM9</scp>

2024-5-7

Linguistic response surface methodology approach to measure the quality of nonlinear frame‐pixel and bit place‐based video steganography

2024-5-7

SiSMA‐SWMS: Signature‐based Secure Monitoring Approach for Smart Waste Monitoring Systems

2024-5-7

Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review

2024-5-7

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司