研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
Security and Privacy
短名 | |
Journal Impact | 1.30 |
国际分区 | TELECOMMUNICATIONS(Q3) |
ISSN | 2475-6725 |
h-index |
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统数学政治学法学计算机网络工程类人工智能万维网互联网隐私程序设计语言业务 |
出版信息 | 出版商: Wiley,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: ,原创研究文献占比: 95.29%,自引率:6.70%, Gold OA占比: 10.00% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Modeling of Malware Propagation Under the Clustering Approach in Scale‐Free Networks
2024-9-30
Synergy of AI and Blockchain to Secure Electronic Healthcare Records
2024-9-30
<scp>UAV</scp> Jamming Localization Against Random Eavesdropper Positions Using Cuckoo Search Algorithm
2024-9-29
Exploring Novel Frontiers in Online Privacy Ethics
2024-9-26
Privacy Re‐Identification Attacks on Tabular GANs
2024-9-26
A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT‐Enabled Healthcare
2024-9-26
Substitution Box Construction Using Transfer‐Function Assisted Metaheuristic and Booster Algorithm: A Hybrid Approach
2024-9-26
Computer Networks Cybersecurity Monitoring Based on Deep Learning Model
2024-9-24
Game Theoretic Approach Toward Detection of Input‐Driven Evasive Malware in the IoT
2024-9-19
Enhancing E‐Healthcare Data Privacy Through Efficient Dual Signature on Twisted Edwards Curves Encryption Decryption
2024-9-18
An Encryption Algorithm Based on Public‐Key Cryptosystems for Vector Map
2024-9-13
Homomorphic Encryption and Collaborative Machine Learning for Secure Healthcare Analytics
2024-9-13
Promise of Zero‐Knowledge Proofs (ZKPs) for Blockchain Privacy and Security: Opportunities, Challenges, and Future Directions
2024-9-12
An EAADE: Effective Authentication Approach for Data Exchange in Vehicular Social Network for IoV
2024-9-5
Issue Information
2024-9-1
Advanced hybrid malware identification framework for the <scp>Internet of Medical Things</scp>, driven by deep learning
2024-8-26
Guided and unguided approaches for quantum key distribution for secure quantum communication
2024-8-24
Uncovering security vulnerabilities through multiplatform malware analysis
2024-8-19
Secure semi‐automated GDPR compliance service with restrictive fine‐grained access control
2024-8-14
<scp>PIoT</scp>‐fortifying <scp>IoT</scp> device identity and data access: A security framework empowered by blockchain
2024-8-9
A blockchain‐based trusted vehicle service recommendation scheme in intelligent transport systems
2024-8-7
A deep experimental analysis of energy‐proficient firewall policies and security practices for resource limited wireless networks
2024-8-5
A lightweight security defense algorithm for multimodal attack blocking in industrial control networks based on momentum enhanced feature graphs
2024-8-5
<scp>IoT</scp> malware detection using static and dynamic analysis techniques: A systematic literature review
2024-7-19
An approach for mitigating cognitive load in password management by integrating QR codes and steganography
2024-7-16
Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis
2024-7-14
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
2024-7-12
Research on privacy leakage of celebrity's ID card number based on real‐name authentication
2024-7-11
A differential privacy aided DeepFed intrusion detection system for IoT applications
2024-7-10
Dark patterns: <scp>EU</scp>'s regulatory efforts
2024-7-7
An analytical survey of cyber‐physical systems in water treatment and distribution: Security challenges, intrusion detection, and future directions
2024-7-4
Enhancing agricultural wireless sensor network security through integrated machine learning approaches
2024-7-2
Issue Information
2024-7-1
On the trade‐off between rate and reliability for secret key generation in wireless channels
2024-6-30
A modified <scp>RC</scp>‐4 cryptosystems to enhance security by using negative key schedule
2024-6-29
Image encryption algorithm based on a memcapacitor‐based hyperchaotic system and <scp>DNA</scp> coding
2024-6-27
Modern ransomware: Evolution, methodology, attack model, prevention and mitigation using multi‐tiered approach
2024-6-20
Blockchain‐based federated learning approaches in internet of things applications
2024-6-18
Detection of Covid‐19 disease by using privacy‐aware artificial intelligence system
2024-6-18
A trust distributed learning (D‐NWDAF) against poisoning and byzantine attacks in B5G networks
2024-6-18
Trajectory tracking attack for vehicular ad‐hoc networks
2024-6-18
SecureCare: A blockchain‐assisted wearable body area network for secure and scalable IoT healthcare services
2024-6-9
Detection of malicious smart contracts by fine‐tuning GPT‐3
2024-6-9
Privacy‐preserving security monitoring data sharing of new power system based on batch verification ring signature
2024-6-7
A survey analysis of quantum computing adoption and the paradigm of privacy engineering
2024-6-7
Designing efficient patient‐centric smart contracts for healthcare ecosystems with access control capabilities
2024-6-7
A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment
2024-6-5
Network intrusion detection system for IoT security using machine learning and statistical based hybrid feature selection
2024-6-5
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远