Security and Communication Networks

Table of Contents: 2017

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 5258010
  • - Research Article

A Multidomain Survivable Virtual Network Mapping Algorithm

Xiancui Xiao | Xiangwei Zheng | Yuang Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 3910126
  • - Research Article

Privacy-Preserving -Means Clustering under Multiowner Setting in Distributed Cloud Environments

Hong Rong | Huimei Wang | ... | Ming Xian
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 2314860
  • - Research Article

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

Donghui Hu | Qiang Shen | ... | Lina Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 3847092
  • - Research Article

Parameterization of LSB in Self-Recovery Speech Watermarking Framework in Big Data Mining

Shuo Li | Zhanjie Song | ... | Jianguo Wei
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 2376484
  • - Research Article

Data Placement for Privacy-Aware Applications over Big Data in Hybrid Clouds

Xiaolong Xu | Xuan Zhao | ... | Alex X. Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7495974
  • - Research Article

An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints

Li Kuang | Yin Wang | ... | Mengyao Zhu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 2539034
  • - Research Article

A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks

Muhammad Hilmi Kamarudin | Carsten Maple | ... | Nader Sohrabi Safa
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 7041381
  • - Research Article

BAS: The Biphase Authentication Scheme for Wireless Sensor Networks

Rabia Riaz | Tae-Sun Chung | ... | Nazish Yaqub
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 8295275
  • - Corrigendum

Corrigendum to “Research on a New Signature Scheme on Blockchain”

Chao Yuan | Mi-xue Xu | Xue-ming Si
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 6562953
  • - Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Mohamed Amine Ferrag | Leandros A. Maglaras | ... | Lei Shu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 1723658
  • - Research Article

Remotely Exploiting AT Command Attacks on ZigBee Networks

Ivan Vaccari | Enrico Cambiaso | Maurizio Aiello
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 2948025
  • - Research Article

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment

Jian Mao | Wenqian Tian | ... | Jianhong Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 3126010
  • - Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Guoyin Zhang | Liang Kou | ... | Jianguo Sun
  • Security and Communication Networks -
  • Special Issue
  • Volume 2017
  • - Article ID 4121765
  • - Research Article

Android Rooting: An Arms Race between Evasion and Detection

Long Nguyen-Vu | Ngoc-Tu Chau | ... | Souhwan Jung
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2017
  • - Article ID 7892182
  • - Research Article

Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing

Tomasz Andrysiak | Łukasz Saganowski | Piotr Kiedrowski
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.