Security and Communication Networks

Table of Contents

Table of Contents

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7828378
  • - Research Article

[Retracted] Prediction of Customer Demand for Hands-On Inquiry-Based Learning (HIBL) Product Based on Big Data Clustering Algorithm

Xingxing Bai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5087129
  • - Research Article

[Retracted] Art Style Transfer of Oil Painting Based on Parallel Convolutional Neural Network

Xin Jin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3766417
  • - Research Article

[Retracted] A Statistical English Syntax Analysis Model Based on Linguistic Evaluation Information

Peng Shu | Sun Cuiqin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3161143
  • - Research Article

A Protocol-Independent Botnet Detection Method Using Flow Similarity

Jianbing Liang | Shuang Zhao | Shuhui Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2644032
  • - Research Article

[Retracted] Research on Education Teaching Quality Analysis Based on the Neural Network Model

Ying Zhu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7875825
  • - Research Article

[Retracted] Security Research in Personnel Electronic File Management Based on Blockchain Technology

Hongbing Wang | Jian Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1825171
  • - Research Article

[Retracted] The Validity of Marketing Strategy of Tourist Attractions Based on Experiential Marketing

Mei Song | Tianjiao Niu | ... | Xiaoyi Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 8621083
  • - Research Article

A Systematic Overview of the Machine Learning Methods for Mobile Malware Detection

Yu-kyung Kim | Jemin Justin Lee | ... | Kyungho Lee
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8354903
  • - Research Article

[Retracted] Dynamic Deduplication Algorithm for Cross-User Duplicate Data in Hybrid Cloud Storage

Feng Gang | DaHuan Wei
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5161398
  • - Research Article

[Retracted] Contemporary Advertising Text Art Design and Effect Evaluation by IoT Deep Learning under the Smart City

Likun Zhang | Xiaoyan Li | ... | Wei Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 4336526
  • - Research Article

High-Capacity Data Hiding Method Based on Two Subgroup Pixels-Value Adjustment Using Encoding Function

Jie Sun | ZhaoFang Yang | ... | Sha Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8653453
  • - Research Article

IBE-Signal: Reshaping Signal into a MITM-Attack-Resistant Protocol

Shiqi Liu | Yan Shao | ... | Hong Di
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1812273
  • - Research Article

Attention-Based LSTM Model for IFA Detection in Named Data Networking

Xin Zhang | Ru Li | Wenhan Hou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3692628
  • - Research Article

[Retracted] Enterprise Supply Chain Risk Assessment Based on the Support Vector Machine Algorithm and Fuzzy Model

Xiaoni Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1953723
  • - Research Article

[Retracted] Systematic Assessment of the Interoperability Requirements and Challenges of Secure Blockchain-Based Electronic Health Records

Faheem Ahmad Reegu | Hafiza Abas | ... | Rituraj Jain
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.