Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1321198
  • - Research Article

Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption

Xiaopeng Yu | Wei Zhao | ... | Dianhua Tang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8541313
  • - Research Article

[Retracted] Cloud Storage Model Based on the BGV Fully Homomorphic Encryption in the Blockchain Environment

Jie Huang | Dehua Wu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8024518
  • - Research Article

[Retracted] Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT

Anand Kumar | Mohammed Rahmath | ... | Simon Atuah Asakipaam
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 6486816
  • - Review Article

Detecting Noncooperation Nodes Mechanisms in Wireless Networks: A Survey

Solmaz Nobahary | Hossein Gharaee Garakani | Ahmad Khademzadeh
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3639174
  • - Research Article

[Retracted] Research on Network Security Situational Awareness Based on Crawler Algorithm

Xu Wu | Dezhi Wei | ... | Evans Asenso
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2902263
  • - Research Article

[Retracted] Simulation of Vehicular Network Use in Emergency Situations and Security Applications on a Pakistan Highway

Asaad T. Al-Douri | Noor Mohammed Kadhim | ... | Melese Abeyie
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3690789
  • - Research Article

[Retracted] An English Writing Grammar Error Correction Technology Based on Similarity Algorithm

Qingyu Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8773259
  • - Research Article

[Retracted] Building an Urban Smart Community System Based on Association Rule Algorithms

Zhou Wenwen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1222660
  • - Research Article

[Retracted] An Anonymous Signature-Based Authentication and Key Agreement Scheme for Vehicular Ad Hoc Networks

Azees M | Arun Sekar Rajasekaran | Muhammad Islam Satti
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9118201
  • - Research Article

[Retracted] The Influence of Multidimensional Gray Theory on Higher Education Cooperation Projects under the Mobile Communication System

Wenjun Shang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4569954
  • - Research Article

[Retracted] Research on Motor Bearing Fault Diagnosis Based on the AdaBoost Algorithm and the Ensemble Learning with Bayesian Optimization in the Industrial Internet of Things

Jiahui Jiang | Yuqing Liu | ... | Hanting Shen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3877230
  • - Research Article

[Retracted] Computational Technologies for IoT Networks Application in English Classroom Teaching

Haiying Liu | Yuji Miao | Si Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9548441
  • - Research Article

[Retracted] Path Selection Strategy of Communication Network Based on Graph Convolutional Neural Network

Xiaojun Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8999757
  • - Research Article

[Retracted] Application Analysis of Multi-Intelligence Optimization Decision-Making Method in College Students’ Ideological and Political Education System

Ben Tian | Zhaogang Xie | Wei Peng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6292221
  • - Research Article

[Retracted] On-the-Spot Decision-Making System of Basketball Game Based on Data Mining Algorithm

Dehou Ma
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.