Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9065856
  • - Research Article

Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks

Guilherme Oliveira | Evelio Fernández | ... | César Azurdia-Meza
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5618453
  • - Corrigendum

Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”

Weizhong Qiang | Shizhen Wang | ... | Jiangying Zhong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9325082
  • - Research Article

Generalized Bootstrapping Technique Based on Block Equality Test Algorithm

Xiufeng Zhao | Ailan Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9562801
  • - Research Article

An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks

Duc-Minh Ngo | Cuong Pham-Quoc | Tran Ngoc Thinh
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8753870
  • - Research Article

Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection

Rafał Kozik | Marek Pawlicki | Michał Choraś
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6362010
  • - Research Article

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping

Xiufeng Zhao | Hefeng Mao | ... | Bo Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1635081
  • - Research Article

Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT

Xuefei Liu | Chao Zhang | ... | Russell Higgs
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8706940
  • - Research Article

A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes

Xun Wang | Tao Luo | Jianfeng Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6036087
  • - Research Article

On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels

Tan N. Nguyen | Minh Tran | ... | Miroslav Voznak
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6124160
  • - Research Article

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment

Xiaodan Gu | Ming Yang | ... | Zhen Ling
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2864873
  • - Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Thanh H. Nguyen | Mason Wright | ... | Satinder Singh
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4036815
  • - Research Article

Robust Visual Secret Sharing Scheme Applying to QR Code

Longdan Tan | Kesheng Liu | ... | Yuliang Lu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9291506
  • - Research Article

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

Pablo Salva-Garcia | Jose M. Alcaraz-Calero | ... | Antonio Skarmeta
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1254081
  • - Research Article

A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients

Zied Kricha | Anis Kricha | Anis Sakly
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5289383
  • - Research Article

Asynchronous Group Authentication Based on Geometric Approach

Hong Wang | Jianhua Li | ... | Zhe Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.