Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9864141
  • - Retraction

Retracted: Design and Application of Art Education Communication Platform Based on Machine Vision

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9854971
  • - Retraction

Retracted: Design and Implementation of Intelligent Teaching System Based on Artificial Intelligence and Computer Technology

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9851275
  • - Retraction

Retracted: Application of Data Mining Technology in Enterprise Digital Human Resource Management

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9847251
  • - Retraction

Retracted: On English Courses and Teaching Strategies in Compound Application-Oriented Talents Training Based on the Education Ideas of CDIO in the Construction of Smart Cities

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9840831
  • - Retraction

Retracted: Beat Wash-Sale Tax with Multigraph Convolutional Neural Networks Based Trading Strategy

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 5573310
  • - Research Article

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

Daniela Pöhn | Wolfgang Hommel
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 8043619
  • - Research Article

Nesting Circles: An Interactive Visualization Paradigm for Network Intrusion Detection System Alerts

Mohammad-Salar Shahryari | Leyli Mohammad-Khanli | ... | Mohammad-Reza Feizi-Derakhshi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 8691095
  • - Research Article

Adversarial Attacks on Large Language Model-Based System and Mitigating Strategies: A Case Study on ChatGPT

Bowen Liu | Boao Xiao | ... | Wanchun Dou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9559439
  • - Research Article

Distributed Public Key Certificate-Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology

Keita Kumagai | Shohei Kakei | ... | Shoichi Saito
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 5477738
  • - Research Article

A Low-Overhead Auditing Protocol for Dynamic Cloud Storage Based on Algebra

Fudong Ding | Libing Wu | ... | Qin Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 7556728
  • - Research Article

[Retracted] An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System

Sudipto Bhattacharyya | Senthil Athithan | ... | Saravanakumar Gurusamy
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 7723164
  • - Research Article

[Retracted] A Secure and Efficient Multi-Object Grasping Detection Approach for Robotic Arms

Hui Wang | Jieren Cheng | ... | Jiangpeng Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 8903980
  • - Research Article

An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data

Chao Li | Yuhan Fu | ... | Junjian Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 2801421
  • - Research Article

IoT Security Detection Method Based on Multifeature and Multineural Network Fusion

Zihao Zhu | Leilei Zhang | ... | Xianer Ying
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 7400235
  • - Research Article

Container Scaling Strategy Based on Reinforcement Learning

Huaijun Wang | Chenfei Zhang | ... | Jiang Xu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.