Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5516253
  • - Research Article

An Unsupervised Learning Method for the Detection of Genetically Modified Crops Based on Terahertz Spectral Data Analysis

Shubao Pan | Binyi Qin | ... | Zhi Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5538720
  • - Research Article

[Retracted] Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks

Ching-Chun Chang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5531185
  • - Research Article

Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning

Rahma Gantassi | Bechir Ben Gouissem | ... | Salem Hasnaoui
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6684456
  • - Research Article

A Sensitive File Abnormal Access Detection Method Based on Application Classification

Hui Liu | Hanxing Xue | Hui Lu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8868355
  • - Review Article

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications

Elmustafa Sayed Ali | Mohammad Kamrul Hasan | ... | Savitri Bevinakoppa
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6638134
  • - Research Article

Representativeness-Based Instance Selection for Intrusion Detection

Fei Zhao | Yang Xin | ... | Xinxin Niu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6690988
  • - Research Article

A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols

Qun Wang | Zhonghao Sun | ... | Chao Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6699974
  • - Research Article

Distributed Functional Signature with Function Privacy and Its Application

Muhua Liu | Lin Wang | ... | Jianqiang Song
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 5564354
  • - Research Article

I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree

Wenfeng Xu | Yongxian Fan | Changyong Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6629433
  • - Research Article

Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing

Zhen Zhang | Bing Guo | ... | Hong Su
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6615899
  • - Review Article

Use of Security Logs for Data Leak Detection: A Systematic Literature Review

Ricardo Ávila | Raphaël Khoury | ... | Fábio Petrillo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5537041
  • - Research Article

An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding

Zhongguo Yang | Irshad Ahmed Abbasi | ... | Mingzhu Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6631247
  • - Research Article

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure

Yunzhe Tian | Jiqiang Liu | ... | Wei Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 5567610
  • - Research Article

[Retracted] Research on the Credibility of Social Media Information Based on User Perception

Jiaxi Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6621760
  • - Research Article

Genetic Feature Fusion for Object Skeleton Detection

Yang Qiao | Yunjie Tian | ... | Jianbin Jiao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.