Security and Communication Networks

Table of Contents: 2021

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8066200
  • - Research Article

Can Wavelet Transform Detect LDDoS Abnormal Traffic in Multipath TCP Transmission System?

Gang Lei | Lejun Ji | ... | Hao Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9968275
  • - Review Article

A New Speech Enhancement Technique Based on Stationary Bionic Wavelet Transform and MMSE Estimate of Spectral Amplitude

Mourad Talbi | Med Salim Bouhlel
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9256764
  • - Research Article

[Retracted] Research on Energy-Saving Optimization of Rural Houses in Specific Regions Based on Internet of Things

Yong Yang | Xiancheng Liu | Congxiang Tian
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 1070221
  • - Research Article

[Retracted] Sports Parameter Acquisition Based on Internet of Things and Wavelet Analysis

Hengming Chen | Junyong Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9961172
  • - Research Article

[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites

Farah Tawfiq Abdul Hussien | Abdul Monem S. Rahma | Hala Bahjat Abdul Wahab
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 2093071
  • - Research Article

[Retracted] Construction and Application of Tennis Teaching Digital Resources Based on Deep Learning

Tingting Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8296417
  • - Research Article

Gene Sequence Clustering Based on the Profile Hidden Markov Model with Differential Identifiability

Xujie Ren | Tao Shang | ... | Jianwei Liu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 6129210
  • - Research Article

Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering

Muhammad Shoaib Akhtar | Tao Feng
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9023141
  • - Research Article

Attribute Set-Based Boolean Keyword Search over Encrypted Personal Health Records

Yu Lin | Lingling Xu | ... | Zhiwei Sun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6568602
  • - Research Article

TapChain: A Rule Chain Recognition Model Based on Multiple Features

Keyu Jiang | Hanyi Zhang | ... | Zhe Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6259995
  • - Research Article

[Retracted] Research on Machine Learning-Based Error Correction Algorithm for Spoken French

Jie Gao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6210054
  • - Research Article

Cloud-Assisted Privacy-Preserving Method for Healthcare Using Adaptive Fractional Brain Storm Integrated Whale Optimization Algorithm

S. Thanga Revathi | A. Gayathri | ... | M. Azees
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 3367521
  • - Research Article

Designing an Efficient and Highly Dynamic Substitution-Box Generator for Block Ciphers Based on Finite Elliptic Curves

Ghulam Murtaza | Naveed Ahmed Azam | Umar Hayat
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 2729949
  • - Research Article

A Virtual Machine Migration Strategy Based on the Relevance of Services against Side-Channel Attacks

Ji-Ming Chen | Shi Chen | ... | Li Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 7314823
  • - Research Article

Smart Identity Management System by Face Detection Using Multitasking Convolution Network

Lubna Farhi | Hira Abbasi | Rija Rehman
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.