Security and Communication Networks

Table of Contents: 2019

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8690853
  • - Research Article

SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks

Meiyu Zhang | Qianying Zhang | ... | Yong Guan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 5935292
  • - Research Article

A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function

Jin Wook Byun
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8275074
  • - Research Article

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment

Wenting Shen | Jing Qin | Jixin Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8391425
  • - Research Article

A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning

Jiadong Ren | Zhangqi Zheng | ... | Huaizhi Yan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 9795621
  • - Research Article

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations

Mingfu Xue | Chengxiang Yuan | ... | Jian Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8936784
  • - Research Article

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems

Fute Shang | Buhong Wang | ... | Tengyao Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 6417407
  • - Research Article

Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning

Han Zhang | Yuanbo Guo | Tao Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 4930908
  • - Research Article

Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System

Krzysztof Cabaj | Marcin Gregorczyk | ... | Piotr Żórawski
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 6587020
  • - Research Article

Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase

Marcin Luckner
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 6874592
  • - Research Article

FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN

Maurantonio Caprolu | Simone Raponi | Roberto Di Pietro
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 3898951
  • - Research Article

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning

Teng Hu | Weina Niu | ... | Yuan Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 2414687
  • - Research Article

A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS

JingJing Wang | YiLiang Han | ... | JiaYong Chen
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8093578
  • - Research Article

Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation

Haiying Ma | Zhanjun Wang | Zhijin Guan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8954914
  • - Research Article

Efficient Extraction of Network Event Types from NetFlows

Gustav Sourek | Filip Zelezny
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 2674684
  • - Research Article

A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning

Yuntao Zhao | Bo Bo | ... | Bo Yu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.