Security and Communication Networks

Communication Security in Socialnet-Oriented Cyber Spaces 2021


Publishing date
01 Jun 2022
Status
Closed
Submission deadline
28 Jan 2022

Lead Editor

1Soonchunhyang University, Asan, Republic of Korea

2Luleå University of Technology, Luleå, Sweden

3Nankai University, Tianjin, China

4Zhejiang Normal University, Jinhua, China

5University of Massachusetts Dartmouth, Dartmouth, USA

This issue is now closed for submissions.

Communication Security in Socialnet-Oriented Cyber Spaces 2021

This issue is now closed for submissions.

Description

With the advent of the Internet of Everything, social networks are playing an important role that has the potential to revolutionize the interconnection and interdependence of networks. It is foreseeable that social net service will be the most common approach of the next generation of internet technology. Billions of social network users share their personal data with various devices over the Internet daily. It is undeniable that social network websites and applications facilitate everyone's daily life and enormously expand their social networks.

However, the threats associated with social networks should never be overlooked. Among these are communication security problems, which lead to various attacks including the dissemination of malicious code and the leakage of critical personal information. In recent years, increasing numbers of researchers have been developing advanced techniques to analyze, detect, and prevent these potential threats such as Sybil attacks and Social spam. The goal of this Special Issue is to promote research on communication security in social networks. This topic is mainly for the research of communication security in social network architecture. How to ensure security in communication services for social networks has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide.

The aim of this Special Issue is to provide a platform to share up-to-date scientific achievements in this field. Authors are invited to submit original research and review articles focused on the latest findings in security issues in social networks. Research that highlights potential defence approaches and strategies to enhance communication security on social networks or similar networks is particularly encouraged.

Potential topics include but are not limited to the following:

  • Data security for mobile internet and social networks
  • Big data analysis for mobile internet and social networks
  • Privacy protection in mobile internet and social networks
  • Reliability analysis for social networks and IoT
  • Data mining, knowledge discovery and machine learning for social networks
  • Distributed system security for mobile internet and social computing
  • Authentication and key exchange for mobile internet and social computing
  • Security protocol and formal analysis for social networks and IoT
  • Anonymous communication in mobile internet
  • Trusted computing and trustworthy computing for social networks
  • Blockchain applications for social networks
  • Human factor of cyber security
  • Human-centred security
  • Cyber crime in mobile social networks
  • Cybersecurity awareness

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 3673113
  • - Research Article

A Robust Continuous Authentication System Using Smartphone Sensors and Wasserstein Generative Adversarial Networks

Shihong Zou | Huizhong Sun | ... | Ruijie Quan
  • Special Issue
  • - Volume 2022
  • - Article ID 2255047
  • - Research Article

A Covert-Aware Anonymous Communication Network for Social Communication

Xinda Cheng | Ning Hu | ... | Yixing Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 5225978
  • - Research Article

Weighted Average-Based Complexity Calculation in Block Selection Oriented Reversible Data Hiding

Xin Tang | Yiteng Zhou | ... | Yan Shao
  • Special Issue
  • - Volume 2022
  • - Article ID 8034677
  • - Research Article

A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things

Yan Zhao | Ning Hu | ... | Yuqiang Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 3455647
  • - Research Article

Consider the Consequences: A Risk Assessment Approach for Industrial Control Systems

Aram Kim | Junhyoung Oh | ... | Kyungho Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 4656837
  • - Research Article

KGDetector: Detecting Chinese Sensitive Information via Knowledge Graph-Enhanced BERT

Kai Cong | Tao Li | ... | Fei Gao
  • Special Issue
  • - Volume 2022
  • - Article ID 9119388
  • - Research Article

A New Joint Approach with Temporal and Profile Information for Social Bot Detection

Zhou Yang | Xingshu Chen | ... | Tao Jiang
  • Special Issue
  • - Volume 2022
  • - Article ID 1699657
  • - Research Article

Focusing on the Weakest Link: A Similarity Analysis on Phishing Campaigns Based on the ATT&CK Matrix

Youngsup Shin | Kyoungmin Kim | ... | Kyungho Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 4233238
  • - Research Article

Blockchain Empowered Federated Learning for Distributed Network Security Behaviour Knowledge Base in 6G

Kun Li | Huachun Zhou | ... | Hongke Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 4511510
  • - Research Article

Textual Adversarial Training of Machine Learning Model for Resistance to Adversarial Examples

Hyun Kwon | Sanghyun Lee
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.