Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 1957497
  • - Research Article

Research on SDN Fingerprint Attack Defense Mechanism Based on Dynamic Disturbance and Information Entropy Detection

Xing Fang | Wenhui Zhang | ... | Yuming Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1327190
  • - Research Article

[Retracted] Design and Application of Art Education Communication Platform Based on Machine Vision

Bingyan Chen | Yao Lu | ... | Wenya Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9588460
  • - Research Article

[Retracted] Big Data’s Analysis and Prediction Method of Art Education Based on the BP Neural Network

Xinya Zhu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4183059
  • - Research Article

[Retracted] Reforming the Teaching of Engineering Cost Budgeting Majors by Integrating VR and BIM Technology under the Internet of Things

Yanfen Zhang | Haijun Mo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8449987
  • - Research Article

Privacy Preservation Learning with Deep Cooperative Method for Multimedia Data Analysis

Wen Si | Cong Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8700730
  • - Research Article

[Retracted] Application of Blockchain Technology in Water Rights Trading in the Irrigation Area under the Internet-of-Things Environment

Yang Li | Jiancang Xie | ... | Nan Zhai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1186633
  • - Research Article

NormalAttack: Curvature-Aware Shape Deformation along Normals for Imperceptible Point Cloud Attack

Keke Tang | Yawen Shi | ... | Zhaoquan Gu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9063568
  • - Research Article

[Retracted] Analysis of the Structure of Aerobics Complete Sets of Movements Based on Genetic Algorithm

Huiyun Yang | Feng Miao | Xue Deng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9032828
  • - Research Article

LPS-ORAM: Perfectly Secure Oblivious RAM with Logarithmic Bandwidth Overhead

Yunping Gong | Fei Gao | ... | Qiaoyan Wen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6861323
  • - Research Article

[Retracted] A Study on Factors Influencing the Use of Unmanned Driving Technology Based on TAM Model

Lingxing Meng | Tianyu Dong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9790398
  • - Research Article

[Retracted] Secure Data Deduplication System with Cyber Security Multikey Management in Cloud Storage

R. Nandha Kumar | T. Sathiya | ... | Henry Kwame Atiglah
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4241870
  • - Research Article

[Retracted] Research on the Cultivation of College English Listening, Speaking, Reading, and Writing Ability by VR Technology

Zhen Zeng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3018374
  • - Research Article

[Retracted] Development Management of Infant Dairy Industry Integrating Internet of Things under the Background of Family Planning Policy Adjustment

Qingxin Chen | Huihui Shi | Jiawen Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1871060
  • - Research Article

[Retracted] Construction of Digital Marketing Recommendation Model Based on Random Forest Algorithm

Weiji Gao | Zhihua Ding
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1511153
  • - Research Article

[Retracted] Construction and Application of iWrite Artificial Intelligence Evaluation System for College English Writing

Lili Jian
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.