Mohammad Alauthman, Hanan Aljuaid, P. Sathyaprakash, A. Aldweesh, A. M, Tariq Rasheed, A. Jumani
{"title":"针对安全和通信网络的加密隐身方法的意外数据行为分析","authors":"Mohammad Alauthman, Hanan Aljuaid, P. Sathyaprakash, A. Aldweesh, A. M, Tariq Rasheed, A. Jumani","doi":"10.1007/s11036-023-02217-4","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"40 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network\",\"authors\":\"Mohammad Alauthman, Hanan Aljuaid, P. Sathyaprakash, A. Aldweesh, A. M, Tariq Rasheed, A. Jumani\",\"doi\":\"10.1007/s11036-023-02217-4\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":38235,\"journal\":{\"name\":\"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\",\"volume\":\"40 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/s11036-023-02217-4\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s11036-023-02217-4","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Computer Science","Score":null,"Total":0}
期刊介绍:
JoWUA is an online peer-reviewed journal and aims to provide an international forum for researchers, professionals, and industrial practitioners on all topics related to wireless mobile networks, ubiquitous computing, and their dependable applications. JoWUA consists of high-quality technical manuscripts on advances in the state-of-the-art of wireless mobile networks, ubiquitous computing, and their dependable applications; both theoretical approaches and practical approaches are encouraged to submit. All published articles in JoWUA are freely accessible in this website because it is an open access journal. JoWUA has four issues (March, June, September, December) per year with special issues covering specific research areas by guest editors.