Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7024842
  • - Research Article

Information Propagation Prediction Based on Key Users Authentication in Microblogging

Miao Yu | Yongzheng Zhang | ... | Yijing Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2790373
  • - Research Article

A Heuristic Model for Supporting Users’ Decision-Making in Privacy Disclosure for Recommendation

Hongchen Wu | Huaxiang Zhang | ... | Xinjun Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9845426
  • - Research Article

Cloud Based Data Protection in Anonymously Controlled SDN

Jian Shen | Jun Shen | ... | Tianqi Zhou
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4723862
  • - Research Article

Detecting P2P Botnet in Software Defined Networks

Shang-Chiuan Su | Yi-Ren Chen | ... | Yi-Bing Lin
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4945152
  • - Research Article

A Clustering -Anonymity Privacy-Preserving Method for Wearable IoT Devices

Fang Liu | Tong Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6160125
  • - Research Article

An Alternative Method for Understanding User-Chosen Passwords

Zhixiong Zheng | Haibo Cheng | ... | Ping Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7318043
  • - Research Article

Analysis of Iterative Erasure Insertion and Decoding of FH/MFSK Systems without Channel State Information

Jinsoo Park | Gangsan Kim | ... | Suil Kim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9649643
  • - Research Article

OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

Biao Han | Xiangrui Yang | ... | Jinshu Su
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6328504
  • - Research Article

An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks

Jiawei Tang | Anfeng Liu | ... | Tian Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4123736
  • - Research Article

Security Analysis of Dynamic SDN Architectures Based on Game Theory

Chao Qi | Jiangxing Wu | ... | Shuo Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1301290
  • - Research Article

Nonoverlapping Blocks Based Copy-Move Forgery Detection

Yu Sun | Rongrong Ni | Yao Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6853696
  • - Research Article

Perceptual Hashing-Based Image Copy-Move Forgery Detection

Huan Wang | Hongxia Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6751042
  • - Research Article

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

Yongjae Lee | Seunghyeon Lee | ... | Hyunsoo Yoon
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5906368
  • - Research Article

Distance Measurement Methods for Improved Insider Threat Detection

Owen Lo | William J. Buchanan | ... | Richard Macfarlane
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5650205
  • - Research Article

FAS: Using FPGA to Accelerate and Secure SDN Software Switches

Wenwen Fu | Tao Li | Zhigang Sun
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.