Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9065424
  • - Research Article

Detection Method for Distributed Web-Crawlers: A Long-Tail Threshold Model

Inwoo Ro | Joong Soo Han | Eul Gyu Im
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7350324
  • - Research Article

DR-Net: A Novel Generative Adversarial Network for Single Image Deraining

Chen Li | Yecai Guo | ... | Xiaodong Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1728303
  • - Research Article

Use of Data Visualisation for Zero-Day Malware Detection

Sitalakshmi Venkatraman | Mamoun Alazab
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2731859
  • - Editorial

Covert Communication Networks in Hostile Environments

Kiseon Kim | Jalel Ben-Othman | Prem Mahalik
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9203076
  • - Research Article

GANs Based Density Distribution Privacy-Preservation on Mobility Data

Dan Yin | Qing Yang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9531784
  • - Research Article

Identity-Based Proxy Signcryption Protocol with Universal Composability

Huifang Yu | Zhicang Wang | ... | Xinzhe Gao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1420930
  • - Research Article

Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud

Zhenghong Wang | Zhangjie Fu | Xingming Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 3962821
  • - Editorial

Applied Cryptography and Noise Resistant Data Security

Iqtadar Hussain | Fawad Ahmed | ... | Amir Anees
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6107912
  • - Research Article

Construction of a New Biometric-Based Key Derivation Function and Its Application

Minhye Seo | Jong Hwan Park | ... | Jung Yeon Hwang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3421725
  • - Research Article

An Injective S-Box Design Scheme over an Ordered Isomorphic Elliptic Curve and Its Characterization

Naveed Ahmed Azam | Umar Hayat | Ikram Ullah
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2615249
  • - Research Article

An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature

Xiling Luo | Zequan Zhou | ... | Chaoyong Chen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2138147
  • - Research Article

Practical Suitability and Experimental Assessment of Tree ORAMs

Kholoud Al-Saleh | Abdelfettah Belghith
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5432960
  • - Research Article

A Novel Multiserver Authentication Protocol with Multifactors for Cloud Service

Jian Song | Guang-song Li | ... | Chuan-gui Ma
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3809462
  • - Research Article

Fake and Real Massaging at the Same Time with QR Code in Web Services for Different Users

Mirsat Yesiltepe | Muhammet Kurulay
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6459326
  • - Research Article

Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing

Jieren Cheng | Mengyang Li | ... | Wei Guo
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.