Security and Communication Networks

Table of Contents: 2019

  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 7937816
  • - Research Article

A Novel Three-Layer QR Code Based on Secret Sharing Scheme and Liner Code

Bin Yu | Zhengxin Fu | Sijia Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 2317976
  • - Research Article

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD

Dainius Čeponis | Nikolaj Goranin
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 1315047
  • - Research Article

An API Semantics-Aware Malware Detection Method Based on Deep Learning

Xin Ma | Shize Guo | ... | Zhisong Pan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 2182615
  • - Research Article

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic

Weina Niu | Ting Li | ... | Heng Wu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8171263
  • - Research Article

SNI: Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels

A. Karimi Rizi | M. Naderi Dehkordi | N. Nemat bakhsh
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8567534
  • - Research Article

An Indistinguishably Secure Function Encryption Scheme

Ping Zhang | Yamin Li | Muhua Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 5076324
  • - Research Article

Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface

Dong Wang | Xiaosong Zhang | ... | Jingwei Li
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 9169802
  • - Research Article

Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis

Yahong Xu | Geng Yang | Shuangjie Bai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 4187892
  • - Research Article

A Novel Construction of Constrained Verifiable Random Functions

Muhua Liu | Ping Zhang | Qingtao Wu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 9038650
  • - Research Article

Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images

Pyung-Han Kim | Eun-Jun Yoon | ... | Ki-Hyun Jung
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 7193684
  • - Research Article

SSLDetecter: Detecting SSL Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method

Junwei Tang | Jingjing Li | ... | Zhiyong Xu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8357241
  • - Research Article

CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs

Yi Zhao | Kaitai Liang | ... | Liqun Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 6124165
  • - Research Article

A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition

ShuaiWei Zhang | XiaoYuan Yang | ... | Weidong Zhong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 5175076
  • - Research Article

Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems

Jun Wang | Feixiang Luo | ... | Zhen Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 1751285
  • - Research Article

An Analysis of DDoS Attacks on the Instant Messengers

Mohammad Faisal | Sohail Abbas | ... | Arif Ur Rahman
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.