Security and Communication Networks

Table of Contents: 2024

  • Security and Communication Networks -
  • Special Issue
  • Volume 2024
  • - Article ID 5034640
  • - Research Article

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

Fan Li | Chenyang Liu | ... | Weipeng Qian
  • Security and Communication Networks -
  • Special Issue
  • Volume 2024
  • - Article ID 7382302
  • - Research Article

Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset

Mudassar Waheed | Sana Qadir
  • Security and Communication Networks -
  • Special Issue
  • Volume 2024
  • - Article ID 7538203
  • - Research Article

Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP

Mohammed D. Halloush
  • Security and Communication Networks -
  • Special Issue
  • Volume 2024
  • - Article ID 2764345
  • - Research Article

Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption

JiHye Yang | Kee Sung Kim
  • Security and Communication Networks -
  • Special Issue
  • Volume 2024
  • - Article ID 6651584
  • - Research Article

Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing

Radjaa Bensaid | Nabila Labraoui | ... | Sihem Benfriha
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9824673
  • - Retraction

Retracted: A Review of Motion Vector-Based Video Steganography

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9872686
  • - Retraction

Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9871428
  • - Retraction

Retracted: Simulation of Film and Television Transmission Path Based on Ant Colony Optimization Algorithm

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9871375
  • - Retraction

Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9870738
  • - Retraction

Retracted: Application of Deep Learning Algorithm in Web Page Advertising Design Style

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9870653
  • - Retraction

Retracted: Cryptanalysis and Improvements on Quantum Key Agreement Protocol Based on Quantum Search Algorithm

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9868731
  • - Retraction

Retracted: Fault-Tolerant Secure Routing Based on Trust Evaluation Model in Data Center Networks

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9865215
  • - Retraction

Retracted: High-Concurrency and High-Performance Application of Microservice Order System Based on Big Data

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9864742
  • - Retraction

Retracted: Text Mining of Movie Animation User Comments and Video Artwork Recommendation Based on Machine Learning

Security and Communication Networks
  • Security and Communication Networks -
  • Special Issue
  • - Volume 2024
  • - Article ID 9864701
  • - Retraction

Retracted: Jamming Meets Antijamming: A Survey of GPS Communication Networks

Security and Communication Networks
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision185 days
Acceptance to publication40 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.