Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9591768
  • - Research Article

Efficient Compression and Encryption for Digital Data Transmission

Bruno Carpentieri
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9185760
  • - Research Article

Practical Consideration Factors to Design Array Configuration of Direction Finding System for Airborne Signal Intelligence

Jong-Hwan Lee | Jeung-Min Joo | ... | Young-Ju Park
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3680851
  • - Research Article

A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things

Chen Wang | Jian Shen | ... | Tong Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7142170
  • - Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Faouzi Jaïdi | Faten Labbene Ayachi | Adel Bouhoula
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3578942
  • - Research Article

An Efficient Certificateless Generalized Signcryption Scheme

Bo Zhang | Zhongtian Jia | Chuan Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5634181
  • - Research Article

A Framework for Vulnerability Detection in European Train Control Railway Communications

Irene Arsuaga | Nerea Toledo | ... | Marina Aguado
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 8210614
  • - Review Article

Data Fusion for Network Intrusion Detection: A Review

Guoquan Li | Zheng Yan | ... | Hanlu Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6150491
  • - Editorial

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs

Ding Wang | Shujun Li | Qi Jiang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7202806
  • - Research Article

BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

Songjie Wei | Shuai Li | ... | Meilin Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6728020
  • - Research Article

Robust Fully Distributed Minibatch Gradient Descent with Privacy Preservation

Gábor Danner | Árpád Berta | ... | Márk Jelasity
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1809302
  • - Research Article

Energy-Aware Key Exchange for Securing Implantable Medical Devices

Wonsuk Choi | Youngkyung Lee | ... | Dong Hoon Lee
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4231326
  • - Research Article

Uncovering Tor: An Examination of the Network Structure

Bryan Monk | Julianna Mitchell | ... | Garth Davies
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8475818
  • - Research Article

Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

Reihaneh Safavi-Naini | Alireza Poostindouz | Viliam Lisy
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7670939
  • - Research Article

Jammer Localization in Multihop Wireless Networks Based on Gravitational Search

Tongxiang Wang | Xianglin Wei | ... | Tao Liang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9463653
  • - Research Article

A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

Yuntao Zhao | Wenbo Zhang | ... | Bo Yu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.