Security and Communication Networks

Table of Contents: 2022

  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4510694
  • - Research Article

Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education

Linhong Li | Kaifan Huang | Xiaofan Yang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9095330
  • - Research Article

[Retracted] Visual Dynamic Simulation Model of Unstructured Data in Social Networks

Zhang Xiang
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 4118994
  • - Research Article

Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES

Yawen Ke | Xiaofeng Xia
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3686423
  • - Review Article

Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network

Se-Joon Park | Yong-Joon Lee | Won-Hyung Park
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4429174
  • - Research Article

[Retracted] Construction of the EFL Mobile Learning Model in the Hybrid Distributed Terminal

Lijie Qu | Shihui Song | Zuochun Xiao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 9692892
  • - Research Article

Radio Network Forensic with mmWave Using the Dominant Path Algorithm

Usman Rauf Kamboh | Muhammad Rehman Shahid | ... | Ubaid Ullah
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 4345494
  • - Research Article

A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net

Lianshan Liu | Lingzhuang Meng | ... | Xiaoli Wang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4354086
  • - Research Article

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms

Jinbo Chao | Chunhui Zhao | Fuzhi Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 4714899
  • - Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Minsoo Lee | Hyun Kwon | Hyunsoo Yoon
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 1208846
  • - Research Article

EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application

Ran Li | Yuanfei Zhang | ... | Gang Shi
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 6430612
  • - Research Article

PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing

Feng Hong | Tianming Zhang | ... | Jing Fan
  • Security and Communication Networks -
  • Special Issue
  • Volume 2022
  • - Article ID 7294638
  • - Research Article

BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN

Ping Li | Songtao Guo | ... | Quanjun Zhao
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 7463315
  • - Research Article

[Retracted] Autonomous Orbit Determination System of Navigation Satellite Based on Spaceborne GPS Technology

Li Yang | Haote Ruan | Yunhan Zhang
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 3502041
  • - Research Article

[Retracted] Multilevel Image Edge Detection Algorithm Based on Visual Perception

Hui Li
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2022
  • - Article ID 5755785
  • - Research Article

User Authentication Method via Speaker Recognition and Speech Synthesis Detection

Hyun Park | TaeGuen Kim
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.