研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Security and Privacy

短名
Journal Impact1.30
国际分区TELECOMMUNICATIONS(Q3)
ISSN2475-6725
h-index

期刊主页

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统数学政治学法学计算机网络工程类人工智能万维网互联网隐私程序设计语言业务
出版信息出版商: Wiley出版周期: 期刊类型: journal
基本数据创刊年份: 原创研究文献占比95.29%自引率:6.70%Gold OA占比: 10.00%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Modeling of Malware Propagation Under the Clustering Approach in Scale‐Free Networks

2024-9-30

Synergy of AI and Blockchain to Secure Electronic Healthcare Records

2024-9-30

<scp>UAV</scp> Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm

2024-9-29

Exploring Novel Frontiers in Online Privacy Ethics

2024-9-26

Privacy Re‐Identification Attacks on Tabular GANs

2024-9-26

A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT‐Enabled Healthcare

2024-9-26

Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach

2024-9-26

Computer Networks Cybersecurity Monitoring Based on Deep Learning Model

2024-9-24

Game Theoretic Approach Toward Detection of Input‐Driven Evasive Malware in the IoT

2024-9-19

Enhancing E‐Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption

2024-9-18

An Encryption Algorithm Based on Public‐Key Cryptosystems for Vector Map

2024-9-13

Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics

2024-9-13

Promise of Zero‐Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions

2024-9-12

An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV

2024-9-5

Issue Information

2024-9-1

Advanced hybrid malware identification framework for the <scp>Internet of Medical Things</scp>, driven by deep learning

2024-8-26

Guided and unguided approaches for quantum key distribution for secure quantum communication

2024-8-24

Uncovering security vulnerabilities through multiplatform malware analysis

2024-8-19

Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control

2024-8-14

<scp>PIoT</scp>‐fortifying <scp>IoT</scp> device identity and data access: A security framework empowered by blockchain

2024-8-9

A blockchain‐based trusted vehicle service recommendation scheme in intelligent transport systems

2024-8-7

A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks

2024-8-5

A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs

2024-8-5

<scp>IoT</scp> malware detection using static and dynamic analysis techniques: A systematic literature review

2024-7-19

An approach for mitigating cognitive load in password management by integrating QR codes and steganography

2024-7-16

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

2024-7-14

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review

2024-7-12

Research on privacy leakage of celebrity's ID card number based on real‐name authentication

2024-7-11

A differential privacy aided DeepFed intrusion detection system for IoT applications

2024-7-10

Dark patterns: <scp>EU</scp>'s regulatory efforts

2024-7-7

An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions

2024-7-4

Enhancing agricultural wireless sensor network security through integrated machine learning approaches

2024-7-2

Issue Information

2024-7-1

On the trade‐off between rate and reliability for secret key generation in wireless channels

2024-6-30

A modified <scp>RC</scp>‐4 cryptosystems to enhance security by using negative key schedule

2024-6-29

Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and <scp>DNA</scp> coding

2024-6-27

Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach

2024-6-20

Blockchain‐based federated learning approaches in internet of things applications

2024-6-18

Detection of Covid‐19 disease by using privacy‐aware artificial intelligence system

2024-6-18

A trust distributed learning (D‐NWDAF) against poisoning and byzantine attacks in B5G networks

2024-6-18

Trajectory tracking attack for vehicular ad‐hoc networks

2024-6-18

SecureCare: A blockchain‐assisted wearable body area network for secure and scalable IoT healthcare services

2024-6-9

Detection of malicious smart contracts by fine‐tuning GPT‐3

2024-6-9

Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature

2024-6-7

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

2024-6-7

Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities

2024-6-7

A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment

2024-6-5

Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection

2024-6-5

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司