Security and Communication Networks

Table of Contents: 2021

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9119478
  • - Research Article

Destroy the Robust Commercial Watermark via Deep Convolutional Encoder-Decoder Network

Wei Jia | Zhiying Zhu | Huaqi Wang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2021
  • - Article ID 1160305
  • - Research Article

Practical Frequency-Hiding Order-Preserving Encryption with Improved Update

JiHye Yang | Kee Sung Kim
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 8933681
  • - Research Article

Real-Time Malware Process Detection and Automated Process Killing

Matilda Rhode | Pete Burnap | Adam Wedgbury
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 7621260
  • - Research Article

t-BMPNet: Trainable Bitwise Multilayer Perceptron Neural Network over Fully Homomorphic Encryption Scheme

Joon Soo Yoo | Ji Won Yoon
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 2507670
  • - Research Article

Lodestone: An Efficient Byzantine Fault-Tolerant Protocol in Consortium Blockchains

Chen Shan | Lei Fan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9029664
  • - Research Article

Security and Privacy for Edge-Assisted Internet of Things Security Proof for the SKKE Protocol

Xiangyang Wang | Chunxiang Gu | ... | Siqi Lu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6013252
  • - Research Article

[Retracted] Data Envelopment Analysis Algorithm of Enterprise Economic Benefits Based on Leapfrog Algorithm

Ying Chen | Xiaokang Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 4646087
  • - Research Article

Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture

Pengshou Xie | Haoxuan Yang | ... | Yan Yan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 7941233
  • - Research Article

Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud

Fan Yin | Rongxing Lu | ... | Xiaohu Tang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9870129
  • - Editorial

Machine Learning: The Cyber-Security, Privacy, and Public Safety Opportunities and Challenges for Emerging Applications

Kehua Guo | Zhiyuan Tan | ... | Xiaokang Zhou
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6919530
  • - Research Article

The Optimal Carrier-Secret Ratio for Wireless Covert Channels Based on Constellation Shaping Modulation

Sen Qiao | Guangjie Liu | ... | Weiwei Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 9126833
  • - Research Article

A Graph Optimization-Based Acoustic SLAM Edge Computing System Offering Centimeter-Level Mapping Services with Reflector Recognition Capability

Zou Zhou | Guoli Zhang | ... | Nan Duan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 6136670
  • - Research Article

[Retracted] Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System

Ihtisham Ullah | Basit Raza | ... | Azeem Irshad
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 3294610
  • - Review Article

Survey on Astroturfing Detection and Analysis from an Information Technology Perspective

Tong Chen | Jiqiang Liu | ... | Wei Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2021
  • - Article ID 2890132
  • - Research Article

AVoD: Advanced Verify-on-Demand for Efficient Authentication against DoS Attacks in V2X Communication

Taehyoung Ko | Cheongmin Ji | Manpyo Hong
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.