Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7543212
  • - Research Article

Efficient Channel Selection and Routing Algorithm for Multihop, Multichannel Cognitive Radio Networks with Energy Harvesting under Jamming Attacks

Pham-Duy Thanh | Hiep Vu-Van | Insoo Koo
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4610320
  • - Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Zhiyuan Jiang | Chao Feng | Chaojing Tang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6256872
  • - Research Article

A Modification-Free Steganography Method Based on Image Information Entropy

Xia ShuangKui | Jianbin Wu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6063837
  • - Research Article

A Cascading Failure Model for Command and Control Networks with Hierarchy Structure

Xiue Gao | Duoping Zhang | ... | Bo Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7206835
  • - Research Article

Analysis of Software Implemented Low Entropy Masking Schemes

Dan Li | Jiazhe Chen | ... | Xiaoyun Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3614093
  • - Research Article

Network Intrusion Detection with Threat Agent Profiling

Tomáš Bajtoš | Andrej Gajdoš | ... | Pavol Sokol
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5716878
  • - Research Article

Security Feature Measurement for Frequent Dynamic Execution Paths in Software System

Qian Wang | Jiadong Ren | ... | Changzhen Hu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5150730
  • - Research Article

An Open Architecture Framework for Electronic Warfare Based Approach to HLA Federate Development

HyunSeo Kang | YoonJe Sung | ... | SangYeong Choi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4635715
  • - Research Article

Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme

Tan Ping Zhou | Ning Bo Li | ... | Xu An Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9410278
  • - Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Shuhui Zhang | Xiangxu Meng | ... | Xiaohui Han
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2567463
  • - Research Article

Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors

Hyungu Lee | Jung Yeon Hwang | ... | Ji Sun Shin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7453572
  • - Research Article

Multiple Impossible Differentials Cryptanalysis on 7-Round ARIA-192

Zi-Long Jiang | Chen-Hui Jin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3530969
  • - Research Article

Reversible Data Hiding for DNA Sequence Using Multilevel Histogram Shifting

Suk-Hwan Lee
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3794603
  • - Research Article

Vulnerability Analysis of Network Scanning on SCADA Systems

Kyle Coffey | Richard Smith | ... | Helge Janicke
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7247095
  • - Research Article

Detecting Malware with an Ensemble Method Based on Deep Neural Network

Jinpei Yan | Yong Qi | Qifan Rao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.