Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4121765
  • - Research Article

Android Rooting: An Arms Race between Evasion and Detection

Long Nguyen-Vu | Ngoc-Tu Chau | ... | Souhwan Jung
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7892182
  • - Research Article

Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing

Tomasz Andrysiak | Łukasz Saganowski | Piotr Kiedrowski
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7129505
  • - Review Article

Privacy-Preserving Biometric Authentication: Challenges and Directions

Elena Pagnin | Aikaterini Mitrokotsa
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3261058
  • - Research Article

A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks

Mahmoud Khasawneh | Anjali Agarwal
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7042835
  • - Research Article

A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace

Fusheng Wu | Huanguo Zhang | ... | Shi Yuan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7323158
  • - Research Article

Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups

Jie Zhang | Jie Chen | ... | Chuangui Ma
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6047053
  • - Research Article

Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

Rafał Kozik | Michał Choraś
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2041842
  • - Erratum

Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”

Guomin Zhou | Peng Zeng | ... | Kim-Kwang Raymond Choo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 3659167
  • - Research Article

CHAOS: An SDN-Based Moving Target Defense System

Yuan Shi | Huanguo Zhang | ... | Bo Zhao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8051389
  • - Research Article

Segmentation Based Video Steganalysis to Detect Motion Vector Modification

Peipei Wang | Yun Cao | Xianfeng Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 4892814
  • - Research Article

Noninteractive Verifiable Outsourcing Algorithm for Bilinear Pairing with Improved Checkability

Yanli Ren | Min Dong | ... | Xiaoni Du
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8575842
  • - Research Article

ABS-TrustSDN: An Agent-Based Simulator of Trust Strategies in Software-Defined Networks

Iván García-Magariño | Raquel Lacuesta
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3691629
  • - Research Article

Low-Rate DDoS Attack Detection Using Expectation of Packet Size

Lu Zhou | Mingchao Liao | ... | Haoyu Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 3834685
  • - Research Article

Fault Attack on the Authenticated Cipher ACORN v2

Xiaojuan Zhang | Xiutao Feng | Dongdai Lin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2713595
  • - Research Article

CP-ABE Access Control Scheme for Sensitive Data Set Constraint with Hidden Access Policy and Constraint Policy

Nurmamat Helil | Kaysar Rahman
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.