Security and Communication Networks

Table of Contents: 2019

  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8124254
  • - Research Article

Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network

Yingxu Lai | Jingwen Zhang | Zenghui Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 9108759
  • - Research Article

Privacy Protection of Social Networks Based on Classified Attribute Encryption

Lin Zhang | Li Li | ... | Ruchuan Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 1982168
  • - Research Article

Power Grid Estimation Using Electric Network Frequency Signals

Woorim Bang | Ji Won Yoon
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 7510809
  • - Research Article

Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators’ Self-Assessment Errors

Mariusz Kamola
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 8124521
  • - Research Article

Detection of Free-Form Copy-Move Forgery on Digital Images

Emre Gürbüz | Guzin Ulutas | Mustafa Ulutas
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 2627608
  • - Research Article

Automatic Identification of Honeypot Server Using Machine Learning Techniques

Cheng Huang | Jiaxuan Han | ... | Jiayong Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 1043794
  • - Research Article

A Malware and Variant Detection Method Using Function Call Graph Isomorphism

Jinrong Bai | Qibin Shi | Shiguang Mu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 4932782
  • - Research Article

Generative Reversible Data Hiding by Image-to-Image Translation via GANs

Zhuo Zhang | Guangyuan Fu | ... | Jia Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 8565397
  • - Research Article

Evaluating the Impact of Name Resolution Dependence on the DNS

Haiyan Xu | Zhaoxin Zhang | ... | Xin Ma
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 6716918
  • - Research Article

A Data-Driven Approach to Cyber Risk Assessment

Paolo Santini | Giuseppe Gottardi | ... | Franco Chiaraluce
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 4109836
  • - Editorial

Big Data Analytics for Cyber Security

Pelin Angin | Bharat Bhargava | Rohit Ranchal
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 2545129
  • - Research Article

A Novel Trust Model Based on Node Recovery Technique for WSN

Ping Qi | Fucheng Wang | Shu Hong
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 5498375
  • - Research Article

Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks

Yunpeng Gao | Nan Zhang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2019
  • - Article ID 4872403
  • - Research Article

Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions

Keita Emura | Goichiro Hanaoka | ... | Yusuke Sakai
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2019
  • - Article ID 1283495
  • - Research Article

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection

Yanping Shen | Kangfeng Zheng | ... | Yixian Yang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.