Security and Communication Networks

Machine Learning for Security and Communication Networks


Publishing date
01 Nov 2021
Status
Closed
Submission deadline
18 Jun 2021

Lead Editor

1Chaoyang University of Technology, Taichung, Taiwan

2Fuzhou University, Fuzhou, China

3National University of Singapore, Singapore

4University of Technology Sydney, Sydney, Australia

This issue is now closed for submissions.

Machine Learning for Security and Communication Networks

This issue is now closed for submissions.

Description

In recent years, supervised machine learning methods (e.g. k nearest neighbours, Bayes' theorem, decision tree, support vector machine, random forest, neural network, convolutional neural network, recurrent neural network, long short-term memory network, gated recurrent unit network), unsupervised machine learning methods (e.g. association rules, k-means, density-based spatial clustering of applications with noise, hierarchical clustering, deep belief networks, deep Boltzmann machine, auto-encoder, de-noising auto-encoder, etc.), reinforcement learning methods (e.g. generative adversarial network, deep Q network, trust region policy optimization, etc.), and federated learning methods have been applied to security and communication networks. For instance, machine learning methods have been used to analyze the behaviours of the data stream in networks and extract the patterns of malicious activities (packet dropping, worm propagation, jammer attacks, etc.) for generating rules in intrusion detection systems. Furthermore, time-series methods (e.g. local outlier factor, cumulative sum, adaptive online thresholding, etc.) have been proposed to retrieve the time-series features of anomalous behaviours for preventing cyber-attacks and malfunctions.

While the area of machine learning methods for security and communication networks is a rapidly expanding field of scientific research, several open research questions still need to be discussed and studied. For instance, using and improving machine learning methods for malicious activity detection, attack detection, mobile endpoint analyses, repetitive security task automation, zero-day vulnerability prevention, and other security applications are important issues in computing and communications.

This Special Issue will solicit papers across various disciplines of security and communication networks in computing and communications. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • New supervised machine learning methods for security and communication networks
  • New unsupervised machine learning methods for security and communication networks
  • New reinforcement learning methods for security and communication networks
  • New federated learning methods for security and communication networks
  • New optimization methods for security and communication networks

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9805963
  • - Retraction

Retracted: An Online Arrangement Method of Difficult Actions in Competitive Aerobics Based on Multimedia Technology

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9803870
  • - Retraction

Retracted: A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9807486
  • - Retraction

Retracted: Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9790342
  • - Retraction

Retracted: Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9798369
  • - Retraction

Retracted: Tourist Demand Prediction Model Based on Improved Fruit Fly Algorithm

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9764791
  • - Retraction

Retracted: Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9781068
  • - Retraction

Retracted: Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9769026
  • - Retraction

Retracted: Distributed Consensus Algorithm for Nonholonomic Wheeled Mobile Robot

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9872674
  • - Retraction

Retracted: Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network

Security and Communication Networks
  • Special Issue
  • - Volume 2023
  • - Article ID 9890525
  • - Retraction

Retracted: Application of Internet of Things and Edge Computing Technology in Sports Tourism Services

Security and Communication Networks
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.