Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
+
Journal Menu
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Submit
Security and Communication Networks
/
Table of Contents: 2017
Table of Contents
2017
2021
2020
2019
2018
2017
Table of Contents: 2017
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 9127612
- Research Article
Reliable Collaborative Filtering on Spatio-Temporal Privacy Data
Zhen Liu | Huanyu Meng | ... | Feng Liu
28 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 7536381
- Research Article
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering
Ru Zhang | Yanyu Huo | ... | Fangyu Weng
27 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 6430850
- Research Article
Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything
Qian Meng | Jianfeng Ma | ... | Tengfei Yang
27 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 4651395
- Research Article
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks
Yang Zhou | Wei Ni | ... | Yixian Yang
25 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 3075210
- Research Article
Design and Implementation of a Mobile Voting System Using a Novel Oblivious and Proxy Signature
Shin-Yan Chiou | Tsung-Ju Wang | Jiun-Ming Chen
24 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 6898617
- Review Article
A Survey on Breaking Technique of Text-Based CAPTCHA
Jun Chen | Xiangyang Luo | ... | Daofu Gong
24 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 8051728
- Research Article
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher
Hao Chen | Tao Wang | ... | Yunfei Ma
20 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 9097616
- Research Article
Service Composition Optimization Method Based on Parallel Particle Swarm Algorithm on Spark
Xing Guo | Shanshan Chen | ... | Wei Li
19 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 9534754
- Research Article
A New Approach for Delivering Customized Security Everywhere: Security Service Chain
Yi Liu | Hong-qi Zhang | ... | Ying-jie Yang
12 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 6207437
- Research Article
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process
Ke Yin
12 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 6097253
- Research Article
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing
Ji Li | Jianghong Wei | ... | Xuexian Hu
12 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
Volume 2017
- Article ID 2148534
- Research Article
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Shuai Han | Shengli Liu | Lin Lyu
11 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 4376282
- Research Article
A Cloud-User Protocol Based on Ciphertext Watermarking Technology
Keyang Liu | Weiming Zhang | Xiaojuan Dong
11 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 9192084
- Research Article
Trusted Service Scheduling and Optimization Strategy Design of Service Recommendation
Xiaona Xia | Jiguo Yu | ... | Shu Wu
05 Dec 2017
PDF
Download PDF
Citation
Download citation
Security and Communication Networks
-
Special Issue
- Volume 2017
- Article ID 5960307
- Research Article
Detecting Web-Based Botnets Using Bot Communication Traffic Features
Fu-Hau Hsu | Chih-Wen Ou | ... | Po-Ching Lin
03 Dec 2017
PDF
Download PDF
Citation
Download citation
First
1
|
2
|
3
|
4
|
5
|
6
|
7
|
8
Last
First
1
|
2
|
3
|
4
Last
Publishing Collaboration
More info
Journal metrics
Acceptance rate
31%
Submission to final decision
85 days
Acceptance to publication
42 days
CiteScore
4.200
Impact Factor
1.288
Submit
Author guidelines
Editorial board
Databases and indexing
Sign up for content alerts
Sign up