Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9065856
  • - Research Article

Optimal Improper Gaussian Signaling for Physical Layer Security in Cognitive Radio Networks

Guilherme Oliveira | Evelio Fernández | ... | César Azurdia-Meza
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5618453
  • - Corrigendum

Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”

Weizhong Qiang | Shizhen Wang | ... | Jiangying Zhong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9325082
  • - Research Article

Generalized Bootstrapping Technique Based on Block Equality Test Algorithm

Xiufeng Zhao | Ailan Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9562801
  • - Research Article

An Efficient High-Throughput and Low-Latency SYN Flood Defender for High-Speed Networks

Duc-Minh Ngo | Cuong Pham-Quoc | Tran Ngoc Thinh
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8753870
  • - Research Article

Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection

Rafał Kozik | Marek Pawlicki | Michał Choraś
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6362010
  • - Research Article

Analysis on Matrix GSW-FHE and Optimizing Bootstrapping

Xiufeng Zhao | Hefeng Mao | ... | Bo Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1635081
  • - Research Article

Application of Temperature Prediction Based on Neural Network in Intrusion Detection of IoT

Xuefei Liu | Chao Zhang | ... | Russell Higgs
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8706940
  • - Research Article

A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes

Xun Wang | Tao Luo | Jianfeng Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6036087
  • - Research Article

On the Performance of Power Splitting Energy Harvested Wireless Full-Duplex Relaying Network with Imperfect CSI over Dissimilar Channels

Tan N. Nguyen | Minh Tran | ... | Miroslav Voznak
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6124160
  • - Research Article

Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment

Xiaodan Gu | Ming Yang | ... | Zhen Ling
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2864873
  • - Research Article

Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis

Thanh H. Nguyen | Mason Wright | ... | Satinder Singh
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4036815
  • - Research Article

Robust Visual Secret Sharing Scheme Applying to QR Code

Longdan Tan | Kesheng Liu | ... | Yuliang Lu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9291506
  • - Research Article

5G NB-IoT: Efficient Network Traffic Filtering for Multitenant IoT Cellular Networks

Pablo Salva-Garcia | Jose M. Alcaraz-Calero | ... | Antonio Skarmeta
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1254081
  • - Research Article

A Robust Watermarking Scheme Based on the Mean Modulation of DWT Coefficients

Zied Kricha | Anis Kricha | Anis Sakly
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5289383
  • - Research Article

Asynchronous Group Authentication Based on Geometric Approach

Hong Wang | Jianhua Li | ... | Zhe Wang
Security and Communication Networks
 Journal metrics
Acceptance rate30%
Submission to final decision84 days
Acceptance to publication37 days
CiteScore1.810
Impact Factor1.376
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi