Security and Communication Networks

Papers
(The H4-Index of Security and Communication Networks is 34. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Pattern Mathematical Model for Fingerprint Security Using Bifurcation Minutiae Extraction and Neural Network Feature Selection122
A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things101
Understanding User-Level IP Blocks on the Internet99
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors93
Corrigendum to “Rational Protocols and Attacks in Blockchain System”92
WEB DDoS Attack Detection Method Based on Semisupervised Learning77
GTF: An Adaptive Network Anomaly Detection Method at the Network Edge70
Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy69
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering66
User Authentication Method via Speaker Recognition and Speech Synthesis Detection66
Adaptive Alleviation for Popularity Bias in Recommender Systems with Knowledge Graph65
Application of Data Fusion and Image Video Teaching Mode in Physical Education Course Teaching and Evaluation of Teaching Effect65
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data65
Behavior Pattern Mining from Traffic and Its Application to Network Anomaly Detection64
Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model63
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing59
A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks59
Visual Cryptography Using Computation-Free Bit-Plane Reconstruction58
QoE-Aware Video Delivery in Multimedia IoT Network with Multiple Eavesdroppers54
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code54
Encrypted Packet Inspection Based on Oblivious Transfer50
Optimization and Combination Analysis of English Multimodule Learning Strategies based on Computational Intelligence50
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification46
Retracted: The Evaluation of DDoS Attack Effect Based on Neural Network45
Retracted: Artificial Intelligence-Based Online Education System for University Music42
Retracted: A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis41
Effect of Multimodal Teaching on Language Comprehensive Ability under the Background of Artificial Intelligence38
Multiobjective Algorithm for Urban Land Spatial Layout Optimization38
Enabling Fairness-Aware and Privacy-Preserving for Quality Evaluation in Vehicular Crowdsensing: A Decentralized Approach37
Fair and Efficient Robust Secret Sharing Scheme against Rushing Adversaries37
A Novel Maximum Flow Algorithm with Neural Network for Time-Varying Wastage Networks37
Data Privacy in Wearable IoT Devices: Anonymization and Deanonymization37
Hierarchical Network Security Measurement and Optimal Proactive Defense in Cloud Computing Environments35
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection?34
ImageDroid: Using Deep Learning to Efficiently Detect Android Malware and Automatically Mark Malicious Features34
0.025404930114746