Security and Communication Networks

Table of Contents: 2019

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 5306395
  • - Research Article

Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

Leila Khatibzadeh | Zarrintaj Bornaee | Abbas Ghaemi Bafghi
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8123259
  • - Research Article

The Meeting of Acquaintances: A Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach

Tran Khanh Dang | Khanh T. K. Tran
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 9236910
  • - Research Article

Visual and Textual Analysis for Image Trustworthiness Assessment within Online News

Federica Lago | Quoc-Tin Phan | Giulia Boato
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 6809054
  • - Corrigendum

Corrigendum to “Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing”

Jieren Cheng | Mengyang Li | ... | Wei Guo
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 4656480
  • - Research Article

Optimizing Computer Worm Detection Using Ensembles

Nelson Ochieng | Waweru Mwangi | Ismail Ateya
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 3546367
  • - Research Article

Security Measure for Image Steganography Based on High Dimensional KL Divergence

Haitao Song | Guangming Tang | ... | Zhanzhan Gao
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8583130
  • - Research Article

Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing

Lei He | Jianfeng Ma | ... | Dawei Wei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 7457154
  • - Corrigendum

Corrigendum to “Development of the ECAT Preprocessor with the Trust Communication Approach”

Kevser Ovaz Akpinar | Ibrahim Ozcelik
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8485365
  • - Research Article

Malware Detection on Byte Streams of PDF Files Using Convolutional Neural Networks

Young-Seob Jeong | Jiyoung Woo | Ah Reum Kang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 1368905
  • - Review Article

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi | Kevin R. B. Butler
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 4895984
  • - Research Article

MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization

Yuntao Zhao | Chunyu Xu | ... | Yongxin Feng
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 2137561
  • - Research Article

On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree

Vasyl Ustimenko | Urszula Romańczuk-Polubiec | ... | Eustrat Zhupa
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 2387358
  • - Research Article

A Novel Secret Sharing Scheme Based upon Euler’s Theorem

Hefeng Chen | Chin-Chen Chang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 4923590
  • - Research Article

A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment

Wenjie Liu | Peipei Gao | ... | Maojun Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 7682306
  • - Editorial

Machine Learning for Wireless Multimedia Data Security

Zhaoqing Pan | Ching-Nung Yang | ... | Weizhi Meng
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.