Security and Communication Networks

Communication Security in Socialnet-Oriented Cyber Spaces 2021


Publishing date
01 Jun 2022
Status
Closed
Submission deadline
28 Jan 2022

Lead Editor

1Soonchunhyang University, Asan, Republic of Korea

2Luleå University of Technology, Luleå, Sweden

3Nankai University, Tianjin, China

4Zhejiang Normal University, Jinhua, China

5University of Massachusetts Dartmouth, Dartmouth, USA

This issue is now closed for submissions.
More articles will be published in the near future.

Communication Security in Socialnet-Oriented Cyber Spaces 2021

This issue is now closed for submissions.
More articles will be published in the near future.

Description

With the advent of the Internet of Everything, social networks are playing an important role that has the potential to revolutionize the interconnection and interdependence of networks. It is foreseeable that social net service will be the most common approach of the next generation of internet technology. Billions of social network users share their personal data with various devices over the Internet daily. It is undeniable that social network websites and applications facilitate everyone's daily life and enormously expand their social networks.

However, the threats associated with social networks should never be overlooked. Among these are communication security problems, which lead to various attacks including the dissemination of malicious code and the leakage of critical personal information. In recent years, increasing numbers of researchers have been developing advanced techniques to analyze, detect, and prevent these potential threats such as Sybil attacks and Social spam. The goal of this Special Issue is to promote research on communication security in social networks. This topic is mainly for the research of communication security in social network architecture. How to ensure security in communication services for social networks has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide.

The aim of this Special Issue is to provide a platform to share up-to-date scientific achievements in this field. Authors are invited to submit original research and review articles focused on the latest findings in security issues in social networks. Research that highlights potential defence approaches and strategies to enhance communication security on social networks or similar networks is particularly encouraged.

Potential topics include but are not limited to the following:

  • Data security for mobile internet and social networks
  • Big data analysis for mobile internet and social networks
  • Privacy protection in mobile internet and social networks
  • Reliability analysis for social networks and IoT
  • Data mining, knowledge discovery and machine learning for social networks
  • Distributed system security for mobile internet and social computing
  • Authentication and key exchange for mobile internet and social computing
  • Security protocol and formal analysis for social networks and IoT
  • Anonymous communication in mobile internet
  • Trusted computing and trustworthy computing for social networks
  • Blockchain applications for social networks
  • Human factor of cyber security
  • Human-centred security
  • Cyber crime in mobile social networks
  • Cybersecurity awareness

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 3455647
  • - Research Article

Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

Aram Kim | Junhyoung Oh | ... | Kyungho Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 4656837
  • - Research Article

KGDetector: Detecting Chinese Sensitive Information via Knowledge Graph-Enhanced BERT

Kai Cong | Tao Li | ... | Fei Gao
  • Special Issue
  • - Volume 2022
  • - Article ID 9119388
  • - Research Article

A New Joint Approach with Temporal and Profile Information for Social Bot Detection

Zhou Yang | Xingshu Chen | ... | Tao Jiang
  • Special Issue
  • - Volume 2022
  • - Article ID 1699657
  • - Research Article

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Youngsup Shin | Kyoungmin Kim | ... | Kyungho Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 4233238
  • - Research Article

Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G

Kun Li | Huachun Zhou | ... | Hongke Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 4511510
  • - Research Article

Textual Adversarial Training of Machine Learning Model for Resistance to Adversarial Examples

Hyun Kwon | Sanghyun Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 5822124
  • - Research Article

LogCAD: An Efficient and Robust Model for Log-Based Conformal Anomaly Detection

Chunbo Liu | Mengmeng Liang | ... | Zhi Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 9962029
  • - Research Article

Military Information Leak Response Technology through OSINT Information Analysis Using SNSes

Yong-Joon Lee | Se-Joon Park | Won-Hyung Park
  • Special Issue
  • - Volume 2022
  • - Article ID 2196998
  • - Research Article

ASD: ARP Spoofing Detector Using OpenWrt

Yeonseon Jeong | Hyunghoon Kim | Hyo Jin Jo
  • Special Issue
  • - Volume 2022
  • - Article ID 7697863
  • - Research Article

Research on Anti-Alzheimer’s Traditional Chinese Medicine with Data Security: Datasets, Methods, and Evaluation

Peng Tang | Yubin Zheng | ... | Zheng Huang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate53%
Submission to final decision52 days
Acceptance to publication25 days
CiteScore3.300
Journal Citation Indicator0.430
Impact Factor1.968
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.