Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 2083430
  • - Corrigendum

Corrigendum to “A New Metric for Flow-Level Filtering of Low-Rate DDoS Attacks”

Mehmet Şimşek
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4947695
  • - Research Article

Automatic Benchmark Generation Framework for Malware Detection

Guanghui Liang | Jianmin Pang | ... | Yihang Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 9081814
  • - Research Article

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing

Yinghui Zhang | Haonan Su | ... | Qinglan Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 4672072
  • - Research Article

Analysis and Evaluation of SafeDroid v2.0, a Framework for Detecting Malicious Android Applications

Marios Argyriou | Nicola Dragoni | Angelo Spognardi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1505896
  • - Research Article

High Capacity Image Steganography Using Modified LSB Substitution and PVD against Pixel Difference Histogram Analysis

Gandharba Swain
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9103418
  • - Research Article

Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image

Chunqiang Yu | Xianquan Zhang | ... | Jingyu Huang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9706706
  • - Research Article

Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling

Jungwoo Seo | Sangjin Lee
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5087065
  • - Research Article

Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN

Carlos Andres Lara-Nino | Arturo Diaz-Perez | Miguel Morales-Sandoval
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2373545
  • - Research Article

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds

Hua Dai | Hui Ren | ... | Xun Yi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1937670
  • - Research Article

Enhanced Adaptive Cloudlet Placement Approach for Mobile Application on Spark

Yiwen Zhang | Kaibin Wang | ... | Qiang He
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7524102
  • - Research Article

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System

Li Li | Siqin Zhou | ... | Debiao He
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6026878
  • - Research Article

LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network

Binghao Yan | Guodong Han
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5625860
  • - Research Article

HYBINT: A Hybrid Intelligence System for Critical Infrastructures Protection

Javier Hingant | Marcelo Zambrano | ... | Manuel Esteve
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 7631342
  • - Research Article

Hardware/Software Adaptive Cryptographic Acceleration for Big Data Processing

Chunhua Xiao | Lei Zhang | ... | Duo Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 7096271
  • - Research Article

An Adaptive Audio Steganography for Covert Wireless Communication

Guojiang Xin | Yuling Liu | ... | Yu Cao
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.