{"title":"Retracted: Optimization of Substation Alarm Information Processing Based on BP Neural Network","authors":"Security and Communication Networks","doi":"10.1155/2024/9805652","DOIUrl":"https://doi.org/10.1155/2024/9805652","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"41 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Fault-Tolerant Secure Routing Based on Trust Evaluation Model in Data Center Networks","authors":"Security and Communication Networks","doi":"10.1155/2024/9868731","DOIUrl":"https://doi.org/10.1155/2024/9868731","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"37 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: A Novel Cooperative Relaying-Based Vertical Handover Technique for Unmanned Aerial Vehicles","authors":"Security and Communication Networks","doi":"10.1155/2024/9781673","DOIUrl":"https://doi.org/10.1155/2024/9781673","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Software Security Testing through Coverage in Deep Neural Networks","authors":"Security and Communication Networks","doi":"10.1155/2024/9827176","DOIUrl":"https://doi.org/10.1155/2024/9827176","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"19 23","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Construction and Simulation of the Enterprise Financial Risk Diagnosis Model by Using Dropout and BN to Improve LSTM","authors":"Security and Communication Networks","doi":"10.1155/2024/9891262","DOIUrl":"https://doi.org/10.1155/2024/9891262","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"12 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Evaluation Method of Enterprise Management Effectiveness Based on Improved Analytic Hierarchy Process","authors":"Security and Communication Networks","doi":"10.1155/2024/9872686","DOIUrl":"https://doi.org/10.1155/2024/9872686","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"27 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: OWGC-HMC: An Online Web Genre Classification Model Based on Hierarchical Multilabel Classification","authors":"Security and Communication Networks","doi":"10.1155/2024/9859153","DOIUrl":"https://doi.org/10.1155/2024/9859153","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"23 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks","authors":"Security and Communication Networks","doi":"10.1155/2024/9871375","DOIUrl":"https://doi.org/10.1155/2024/9871375","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"107 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139444628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: A Study on Factors Influencing the Use of Unmanned Driving Technology Based on TAM Model","authors":"Security and Communication Networks","doi":"10.1155/2024/9786741","DOIUrl":"https://doi.org/10.1155/2024/9786741","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"28 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Robust and Secure Zero-Watermarking Algorithm for Medical Images Based on Harris-SURF-DCT and Chaotic Map","authors":"Security and Communication Networks","doi":"10.1155/2024/9825714","DOIUrl":"https://doi.org/10.1155/2024/9825714","url":null,"abstract":"<jats:p />","PeriodicalId":49554,"journal":{"name":"Security and Communication Networks","volume":"29 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139442692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}