Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6627956
  • - Research Article

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Tsu-Yang Wu | Lei Yang | ... | SK Hafizul Islam
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8887881
  • - Research Article

Efficient Deep Learning Models for DGA Domain Detection

Juhong Namgung | Siwoon Son | Yang-Sae Moon
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6644107
  • - Research Article

[Retracted] Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network

Yusheng Dai | Hui Li | ... | Min Zheng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6628034
  • - Research Article

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

Yajing Hao | Xinrong Yan | ... | Linfeng Yuan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8884478
  • - Research Article

SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts

Menghui Lou | Xiaolei Dong | ... | Jiachen Shen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6674948
  • - Research Article

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map

Youxia Dong | Xiaoling Huang | ... | Yuanju Gan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8836057
  • - Research Article

Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets

Khalid M. Al-Gethami | Mousa T. Al-Akhras | Mohammed Alawairdhi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6630291
  • - Research Article

Secure Data Collaborative Computing Scheme Based on Blockchain

Tao Feng | Xusheng Wang | ... | Junli Fang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6658642
  • - Research Article

A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers

Shichang Ding | Fan Zhao | Xiangyang Luo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8873195
  • - Research Article

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey

Yawei Yue | Shancang Li | ... | Fuzhong Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8830431
  • - Research Article

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection

Xin Li | Peng Yi | ... | Le Tian
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 8814844
  • - Research Article

Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination

Hui Li | Limin Shen | ... | Zhiming Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6682311
  • - Research Article

Ferry Node Identification Model for the Security of Mobile Ad Hoc Network

Zhifei Wang | Gang Xu | ... | Liqiang He
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6658842
  • - Research Article

A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet

Changguang Wang | Ziqiu Zhao | ... | Qingru Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8846239
  • - Review Article

A Survey on Secure Deployment of Mobile Services in Edge Computing

Mengmeng Cui | Yiming Fei | Yin Liu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.