Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 8031859
  • - Research Article

Cross-Core and Robust Covert Channel Based on Macro-Op Fusion

Han Wang | Ming Tang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 5486566
  • - Research Article

Design and Implementation of a Lightweight Security-Enhanced Scheme for Modbus TCP Protocol

Zechao Liu | Tao Liang | ... | Sizhao Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 3412200
  • - Research Article

HLOChain: A Hierarchical Blockchain Framework with Lightweight Consensus and Optimized Storage for IoT

Qingqing Xie | Fan Dong | Xia Feng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 2803139
  • - Research Article

LogPal: A Generic Anomaly Detection Scheme of Heterogeneous Logs for Network Systems

Lei Sun | Xiaolong Xu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 4911338
  • - Research Article

A Physical Layer Key Generation Scheme Based on Deep Learning Compensation and Balanced Vector Quantization

Liquan Chen | Zhaofa Chen | ... | Aiqun Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 1416999
  • - Research Article

The Design of Vehicle Profile Based on Multivehicle Collaboration for Autonomous Vehicles in Roundabouts

Dongfa Cao | Zhandong Liu | ... | Nan Ding
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 6560747
  • - Research Article

Lightweight Field Insect Recognition and Classification Model Based on Improved Deep Learning under Complex Background

Feng Wu | Yueying Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 5393890
  • - Research Article

ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features

Pengfei Liu | Weiping Wang | ... | Hong Song
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 2093407
  • - Research Article

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward-Curve Digital Signature Algorithm

Gauri Shankar | Liwa H. Ai-Farhani | ... | Issah Abubakari Samori
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9850121
  • - Retraction

Retracted: Research on Moral Education Function of Music Art in College Students Based on Bayesian Learning Algorithm

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • Volume 2023
  • - Article ID 5968168
  • - Research Article

Fed-DNN-Debugger: Automatically Debugging Deep Neural Network Models in Federated Learning

Shaoming Duan | Chuanyi Liu | ... | Hezhong Pan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 1525998
  • - Research Article

Enhanced Multiset Consensus Protocol Based on PBFT for Logistics Information Traceability

Linchao Zhang | Lei Hang | Dohyeun Kim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 3813977
  • - Research Article

Toward High Capacity and Robust JPEG Steganography Based on Adversarial Training

Jianhua Yang | Fei Shang | ... | Yifang Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 1225675
  • - Research Article

[Retracted] FHAAPS: Efficient Anonymous Authentication with Privacy Preservation Scheme for Farm-to-Home Communication

Arun Sekar Rajasekaran | M. Azees | Khalid Yahya
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2023
  • - Article ID 9851259
  • - Retraction

Retracted: Study on Fault Diagnosis Method and Application of Automobile Power Supply Based on Fault Tree-Bayesian Network

Security and Communication Networks
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.