Security and Communication Networks

Table of Contents: 2022

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7788645
  • - Research Article

[Retracted] Research on Marketing Strategy of Chinese Painting and Calligraphy Art Based on Wireless Communication Network Resources

Tian Zhong
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 3990386
  • - Research Article

Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning

Xibin Sun | Du Zhang | ... | Jiahua Tang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6469380
  • - Research Article

[Retracted] Mitigation Impact of Energy and Time Delay for Computation Offloading in an Industrial IoT Environment Using Levenshtein Distance Algorithm

Ahsan Rafiq | Ping Wang | ... | Nteziriza Nkerabahizi Josbert
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6040371
  • - Research Article

[Retracted] Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production

Yating Wei
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 2793116
  • - Research Article

An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications

Arun Sekar Rajasekaran | M. Azees
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2725900
  • - Research Article

[Retracted] A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve

Jiaju Zhu | Meng Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6343764
  • - Research Article

A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value

Lin Yu | Gang Xu | ... | FengQi Wei
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 2576685
  • - Research Article

Dynamical Behavior of Hybrid Propagation of Computer Viruses

Qingyi Zhu | Pingfan Xiang | ... | Chenquan Gan
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 8995704
  • - Research Article

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems

Jinhui Liu | Yong Yu | ... | Huanguo Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4198353
  • - Research Article

[Retracted] Mental and Emotional Recognition of College Students Based on Brain Signal Features and Data Mining

Shaobo An | Zhifen Yu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5365807
  • - Research Article

[Retracted] Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data

Zhang Xun
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5424395
  • - Research Article

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain

Huiying Zou | Xiaofan Liu | ... | Tianqing Zhu
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1560885
  • - Review Article

Traditional and Hybrid Access Control Models: A Detailed Survey

Muhammad Umar Aftab | Ali Hamza | ... | Ammar Rafiq
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1417607
  • - Research Article

A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses

Weizhou Li | Zhiqiang Lin | Qi Chen
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5169873
  • - Research Article

Face Forgery Detection Based on the Improved Siamese Network

Bo Wang | Yucai Li | ... | Mingkan Wu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.