{"title":"Retracted: Engineering Management Model Analysis Using Partial Differential Equation Hilbert Space","authors":"Security and Communication Networks","doi":"10.1155/2024/9816081","DOIUrl":"https://doi.org/10.1155/2024/9816081","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"46 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: A Dynamic Density Peak Clustering Algorithm Based on K-Nearest Neighbor","authors":"Security and Communication Networks","doi":"10.1155/2024/9818710","DOIUrl":"https://doi.org/10.1155/2024/9818710","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"44 31","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: On the Modeling of RTT Time Series for Network Anomaly Detection","authors":"Security and Communication Networks","doi":"10.1155/2024/9891217","DOIUrl":"https://doi.org/10.1155/2024/9891217","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"43 25","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Efficient and Energy-Saving Computation Offloading Mechanism with Energy Harvesting for IoT","authors":"Security and Communication Networks","doi":"10.1155/2024/9898054","DOIUrl":"https://doi.org/10.1155/2024/9898054","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"30 36","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor","authors":"Security and Communication Networks","doi":"10.1155/2024/9848653","DOIUrl":"https://doi.org/10.1155/2024/9848653","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"34 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Research on Securities Portfolio Model Based on Genetic Optimization Neural Network","authors":"Security and Communication Networks","doi":"10.1155/2024/9852152","DOIUrl":"https://doi.org/10.1155/2024/9852152","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"13 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Analysis of Intrusion Detection Approaches for Network Traffic Anomalies with Comparative Analysis on Botnets (2008–2020)","authors":"Security and Communication Networks","doi":"10.1155/2024/9781670","DOIUrl":"https://doi.org/10.1155/2024/9781670","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"11 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and Behavior","authors":"Security and Communication Networks","doi":"10.1155/2024/9854035","DOIUrl":"https://doi.org/10.1155/2024/9854035","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"5 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Application of Deep Learning Algorithm in Web Page Advertising Design Style","authors":"Security and Communication Networks","doi":"10.1155/2024/9870738","DOIUrl":"https://doi.org/10.1155/2024/9870738","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"15 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Fault-Tolerant Secure Routing of BHn-Based Data Center Networks","authors":"Security and Communication Networks","doi":"10.1155/2024/9798105","DOIUrl":"https://doi.org/10.1155/2024/9798105","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"13 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139444094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}