Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7087239
  • - Research Article

A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions

Yao Wang | Wandong Cai | ... | Wei Shao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9672523
  • - Editorial

Emerging and Unconventional: New Attacks and Innovative Detection Techniques

Luca Caviglione | Wojciech Mazurczyk | ... | Sebastian Zander
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2459154
  • - Review Article

A Survey on Security-Aware Measurement in SDN

Heng Zhang | Zhiping Cai | ... | Chak Fone Cheang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9804061
  • - Research Article

A DDoS Attack Detection Method Based on SVM in Software Defined Network

Jin Ye | Xiangyang Cheng | ... | Ling Song
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7657891
  • - Editorial

Big Data Analytics for Information Security

Krzysztof Szczypiorski | Liqiang Wang | ... | Dengpan Ye
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4740174
  • - Editorial

Exploiting the Security Aspects of Compressive Sampling

Junxin Chen | Leo Yu Zhang | ... | Yu-Dong Yao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3652170
  • - Research Article

An Approach for Internal Network Security Metric Based on Attack Probability

Chun Shan | Benfu Jiang | ... | Na Xiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2058429
  • - Research Article

A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

Yun Chen | Kun Lv | Changzhen Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5967635
  • - Research Article

LWR-Based Fully Homomorphic Encryption, Revisited

Fucai Luo | Fuqun Wang | ... | Kefei Chen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1753897
  • - Research Article

An Intrusion Detection and Prevention Framework for Internet-Integrated CoAP WSN

Jorge Granjal | Artur Pedroso
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2639750
  • - Research Article

Development of the ECAT Preprocessor with the Trust Communication Approach

Kevser Ovaz Akpinar | Ibrahim Ozcelik
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1378583
  • - Research Article

Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario

Yanan Chen | Zhenyu Lu | ... | Weixiang Xu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8470949
  • - Research Article

Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks

Yongbin Zeng | Hui Guang | Guangsong Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2854728
  • - Research Article

AppFA: A Novel Approach to Detect Malicious Android Applications on the Network

Gaofeng He | Bingfeng Xu | Haiting Zhu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7393401
  • - Research Article

On the Complexity of Impossible Differential Cryptanalysis

Qianqian Yang | Lei Hu | ... | Siwei Sun
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.