Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2593537
  • - Research Article

A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems

Xiaoguang Niu | Jiawei Wang | ... | Yihao Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6137098
  • - Research Article

DNS Tunneling Detection Method Based on Multilabel Support Vector Machine

Ahmed Almusawi | Haleh Amintoosi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2658318
  • - Research Article

Two-Step Integral Imaging Coding Based Three-Dimensional Information Encryption Approach

Min Zhao | Yan Xing | ... | Qiong-Hua Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 6361901
  • - Research Article

Kuijia: Traffic Rescaling in Software-Defined Data Center WANs

Che Zhang | Hong Xu | ... | Peng Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7545079
  • - Research Article

SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction

Tao Wang | Hongchang Chen | ... | Yulin Lu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4760632
  • - Research Article

Exploiting the Vulnerability of Flow Table Overflow in Software-Defined Network: Attack Model, Evaluation, and Defense

Yadong Zhou | Kaiyue Chen | ... | Yazhe Tang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5249190
  • - Research Article

LSTM-Based Hierarchical Denoising Network for Android Malware Detection

Jinpei Yan | Yong Qi | Qifan Rao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1214681
  • - Research Article

A Wireless Covert Channel Based on Constellation Shaping Modulation

Pengcheng Cao | Weiwei Liu | ... | Yuewei Dai
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9146297
  • - Research Article

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Shin-Yan Chiou | Ching-Hsuan Lin
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.