Security and Communication Networks

Table of Contents: 2018

  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 3672698
  • - Research Article

Hybrid Internal Anomaly Detection System for IoT: Reactive Nodes with Cross-Layer Operation

Nanda Kumar Thanigaivelan | Ethiopia Nigussie | ... | Jouni Isoaho
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9601357
  • - Review Article

A Closer Look at Intrusion Detection System for Web Applications

Nancy Agarwal | Syed Zeeshan Hussain
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6561418
  • - Research Article

Improved Construction for Inner Product Functional Encryption

Qingsong Zhao | Qingkai Zeng | Ximeng Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2870475
  • - Research Article

Towards Optimized DFA Attacks on AES under Multibyte Random Fault Model

Ruyan Wang | Xiaohan Meng | ... | Jian Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 4313769
  • - Research Article

A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution

Ming Li | Hua Ren | ... | Di Xiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5680264
  • - Research Article

A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection

Zhaohui Zhang | Xinxin Zhou | ... | Pengwei Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5923156
  • - Research Article

Identifying Fake Accounts on Social Networks Based on Graph Analysis and Classification Algorithms

Mohammadreza Mohammadrezaei | Mohammad Ebrahim Shiri | Amir Masoud Rahmani
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 5313980
  • - Editorial

Cyberspace Security for Future Internet

Dafang Zhang | Guojun Wang | ... | Wenjia Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 5787102
  • - Research Article

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis

Hao Hu | Yuling Liu | ... | Yuchen Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 8734389
  • - Research Article

WS3N: Wireless Secure SDN-Based Communication for Sensor Networks

Renan C. A. Alves | Doriedson A. G. Oliveira | ... | Cíntia B. Margi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 9327215
  • - Research Article

Deep Learning Approaches for Predictive Masquerade Detection

Wisam Elmasry | Akhan Akbulut | Abdul Halim Zaim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 2029869
  • - Research Article

High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift

Dinh-Chien Nguyen | Thai-Son Nguyen | ... | Fang-Rong Hsu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2018
  • - Article ID 1821804
  • - Research Article

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Xingshuo An | Fuhong Lin | ... | Chao Gong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 6520258
  • - Research Article

Bootstrapping of FHE over the Integers with Large Message Space

Zhizhu Lian | Yupu Hu | ... | Baocang Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2018
  • - Article ID 1404826
  • - Research Article

Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications

Blanca Esther Carvajal-Gámez | Manuel Alejandro Diaz-Casco
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.