Security and Communication Networks

Table of Contents: 2020

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8842539
  • - Research Article

GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things

Yixin Wu | Cheng Huang | ... | Hongyi Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8881760
  • - Research Article

Binary File’s Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification

Hui Guo | Shuguang Huang | ... | Zulie Pan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8842376
  • - Research Article

An Unequal Image Privacy Protection Method Based on Saliency Detection

Rongxin Tu | Wenying Wen | Changsheng Hua
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8845959
  • - Research Article

Privacy-Preserving Multidimensional Data Aggregation Scheme for Smart Grid

Yousheng Zhou | Xinyun Chen | Meihuan Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8843803
  • - Research Article

A Group Recommendation System of Network Document Resource Based on Knowledge Graph and LSTM in Edge Computing

Yuezhong Wu | Qiang Liu | ... | Ziran Peng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8850505
  • - Research Article

E2PP: An Energy-Efficient Path Planning Method for UAV-Assisted Data Collection

Xiang Ji | Xianjia Meng | ... | Dingyi Fang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2020
  • - Article ID 8848356
  • - Research Article

Chaotic Cryptosystem for Selective Encryption of Faces in Photographs

Jorge Aguilar Santiago | Octavio Flores Siordia | ... | Maricela Jiménez Rodríguez
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8850472
  • - Research Article

Hidden Service Website Response Fingerprinting Attacks Based on Response Time Feature

Yitong Meng | Jinlong Fei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2020
  • - Article ID 8869057
  • - Research Article

A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques

Isaac Amankona Obiri | Qi Xia | ... | Jianbin Gao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8889317
  • - Research Article

High-Resolution SAR Image Despeckling Based on Nonlocal Means Filter and Modified AA Model

Qiao Ke | Sun Zeng-guo | ... | Rafał Scherer
  • Security and Communication Networks -
  • Special Issue
  • Volume 2020
  • - Article ID 8860598
  • - Research Article

Hardware Implementation of Secure Lightweight Cryptographic Designs for IoT Applications

Wajih El Hadj Youssef | Ali Abdelli | ... | Mohsen Machhout
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 6656066
  • - Research Article

An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things

Hongyu Yang | Renyun Zeng | ... | Jiyong Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8819958
  • - Research Article

Modelling the Mimic Defence Technology for Multimedia Cloud Servers

Feng Feng | Xiabing Zhou | ... | Qinglei Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8861639
  • - Research Article

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing

Afifa Maryam | Usman Ahmed | ... | Muhammad Azhar Iqbal
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2020
  • - Article ID 8891183
  • - Research Article

PyRos: A State Channel-Based Access Control System for a Public Blockchain Network

Siwan Noh | Sang Uk Shin | Kyung-Hyune Rhee
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.