Security and Communication Networks

Machine Learning for Security and Communication Networks 2021


Publishing date
01 Nov 2022
Status
Published
Submission deadline
01 Jul 2022

Lead Editor
Guest Editors

1Chaoyang University of Technology, Taichung, Taiwan

2National University of Singapore, Singapore


Machine Learning for Security and Communication Networks 2021

Description

In recent years, supervised machine learning methods (e.g. k-nearest neighbours, Bayes' theorem, decision tree, support vector machine, random forest, neural network, convolutional neural network, recurrent neural network, long short-term memory network, gated recurrent unit network), unsupervised machine learning methods (e.g. association rules, k-means, density-based spatial clustering of applications with noise, hierarchical clustering, deep belief networks, deep Boltzmann machine, auto-encoder, de-noising auto-encoder, etc.), reinforcement learning methods (e.g. generative adversarial network, deep Q network, trust region policy optimization, etc.), and federated learning methods have been applied to security and communication networks. For instance, machine learning methods have been used to analyze the behaviours of the data stream in networks and extract the patterns of malicious activities (packet dropping, worm propagation, jammer attacks, etc.) for generating rules in intrusion detection systems. Furthermore, time-series methods (e.g. local outlier factor, cumulative sum, adaptive online thresholding, etc.) have been proposed to retrieve the time-series features of anomalous behaviours for preventing cyber-attacks and malfunctions.

While the area of machine learning methods for security and communication networks is a rapidly expanding field of scientific research, several open research questions still need to be discussed and studied. For instance, using and improving machine learning methods for malicious activity detection, attack detection, mobile endpoint analyses, repetitive security task automation, zero-day vulnerability prevention, and other security applications are important issues in computing and communications.

This Special Issue will solicit papers across various disciplines of security and communication networks in computing and communications. Original research and review articles are welcome.

Potential topics include but are not limited to the following:

  • New supervised machine learning methods for security and communication networks
  • New unsupervised machine learning methods for security and communication networks
  • New reinforcement learning methods for security and communication networks
  • New federated learning methods for security and communication networks
  • New optimization methods for security and communication networks

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 2565639
  • - Research Article

[Retracted] Design of College Scheduling Algorithm Based on Improved Genetic Ant Colony Hybrid Optimization

Ting Li | Qiang Xie | Hua Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 4994383
  • - Research Article

[Retracted] Multiobjective Optimization Algorithm for EFRM Strategy

Weiwei Jiang | Xi Wang | Xuefeng Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 8937896
  • - Research Article

[Retracted] Application of CAD in Semifinished Product Packaging Art Design

Yangyang Mao | Tie Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 1797080
  • - Research Article

[Retracted] The Relevance of Microblog Sentiment Analysis on College Students' Growth Development and Management

Lan Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 8807215
  • - Research Article

[Retracted] Correlation Analysis of Interbank Money Market Interest Rate and Financial Crisis Based on Neural Network Model

Xiaohua Zeng | Chiping Yuan | Changzhou Liang
  • Special Issue
  • - Volume 2022
  • - Article ID 4880555
  • - Research Article

[Retracted] Application of Convolutional Neural Network Algorithm under Deep Learning in Digital Clothing Design

Xiangyi Xue | Xiangying Xue
  • Special Issue
  • - Volume 2022
  • - Article ID 1131994
  • - Research Article

[Retracted] Optimization and Application of Random Forest Algorithm for Applied Mathematics Specialty

Wei Li
  • Special Issue
  • - Volume 2022
  • - Article ID 4912841
  • - Research Article

[Retracted] Application of Improved Machine Learning and Fuzzy Algorithm in Educational Information Technology

Zhangfu Wang | Guohu Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 6241182
  • - Research Article

[Retracted] Exploring the Influence of Big Data Technology on the Innovation of the Enterprise Economic Management Mode

Yingning Wu
  • Special Issue
  • - Volume 2022
  • - Article ID 2340521
  • - Research Article

[Retracted] Financial and Economic Sequence Forecasting Based on Time Slot Allocation Algorithm

Yuhan Wu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.