Security and Communication Networks

Table of Contents: 2022

  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 2566681
  • - Research Article

A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack

Boyang Zhou | Chunming Wu | ... | Dong Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9403986
  • - Research Article

Impact of Digital Transformation of Engineering Enterprises on Enterprise Performance Based on Data Mining and Credible Bayesian Neural Network Model

Zhenfan Liu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9821762
  • - Retraction

Retracted: IoT Networks and Digital Twin Technology-Based English Classroom Immersive Teaching

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9865315
  • - Retraction

Retracted: Analysis of Abnormal Flight and Controllers Data Based on DBSCAN Method

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 2300407
  • - Research Article

An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense

Zhengbin Zhu | Hong Yu | ... | Huapeng Yu
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3317048
  • - Research Article

Few-Shot Learning-Based Network Intrusion Detection through an Enhanced Parallelized Triplet Network

Ji-Yu Tian | Zu-Min Wang | ... | Zhi-He Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9790607
  • - Retraction

Retracted: Curriculum Design of Art Higher Vocational Education Based on Artificial Intelligence Assisted Virtual Reality Technology

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 8288855
  • - Research Article

Improving the Imperceptibility of Adversarial Examples Based on Weakly Perceptual Perturbation in Key Regions

Yekui Wang | Tieyong Cao | ... | Bingyang Fu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9765201
  • - Retraction

Retracted: An Improved Method Research on Graphics and Image Processing System

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9763702
  • - Retraction

Retracted: Application of the Iot Network and the Deep Learning Concept in Music Teaching

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3440123
  • - Research Article

AEGuard: Image Feature-Based Independent Adversarial Example Detection Model

Mihui Kim | Junhyeok Yun
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3083909
  • - Research Article

An Authentication-Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL

Ubaid Ullah | Usama Musharaf | Muhammad Haleem
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9803909
  • - Retraction

Retracted: Research on Collaborative Optimization Model of Tourism Resources and Highway Network Based on IoT Network and Deep Learning

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9872745
  • - Retraction

Retracted: Research on Marketing Management Risk Decision Model Based on LINEST Function

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9864709
  • - Retraction

Retracted: 5G-Based Information Platform Design of Tourist Attractions in the Context of Mobile Big Data

Security and Communication Networks
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.