Security and Communication Networks

Communication Security in Socialnet-Oriented Cyber Spaces 2021


Publishing date
01 Jun 2022
Status
Closed
Submission deadline
28 Jan 2022

Lead Editor

1Soonchunhyang University, Asan, Republic of Korea

2Luleå University of Technology, Luleå, Sweden

3Nankai University, Tianjin, China

4Zhejiang Normal University, Jinhua, China

5University of Massachusetts Dartmouth, Dartmouth, USA

This issue is now closed for submissions.

Communication Security in Socialnet-Oriented Cyber Spaces 2021

This issue is now closed for submissions.

Description

With the advent of the Internet of Everything, social networks are playing an important role that has the potential to revolutionize the interconnection and interdependence of networks. It is foreseeable that social net service will be the most common approach of the next generation of internet technology. Billions of social network users share their personal data with various devices over the Internet daily. It is undeniable that social network websites and applications facilitate everyone's daily life and enormously expand their social networks.

However, the threats associated with social networks should never be overlooked. Among these are communication security problems, which lead to various attacks including the dissemination of malicious code and the leakage of critical personal information. In recent years, increasing numbers of researchers have been developing advanced techniques to analyze, detect, and prevent these potential threats such as Sybil attacks and Social spam. The goal of this Special Issue is to promote research on communication security in social networks. This topic is mainly for the research of communication security in social network architecture. How to ensure security in communication services for social networks has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide.

The aim of this Special Issue is to provide a platform to share up-to-date scientific achievements in this field. Authors are invited to submit original research and review articles focused on the latest findings in security issues in social networks. Research that highlights potential defence approaches and strategies to enhance communication security on social networks or similar networks is particularly encouraged.

Potential topics include but are not limited to the following:

  • Data security for mobile internet and social networks
  • Big data analysis for mobile internet and social networks
  • Privacy protection in mobile internet and social networks
  • Reliability analysis for social networks and IoT
  • Data mining, knowledge discovery and machine learning for social networks
  • Distributed system security for mobile internet and social computing
  • Authentication and key exchange for mobile internet and social computing
  • Security protocol and formal analysis for social networks and IoT
  • Anonymous communication in mobile internet
  • Trusted computing and trustworthy computing for social networks
  • Blockchain applications for social networks
  • Human factor of cyber security
  • Human-centred security
  • Cyber crime in mobile social networks
  • Cybersecurity awareness

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5822124
  • - Research Article

LogCAD: An Efficient and Robust Model for Log-Based Conformal Anomaly Detection

Chunbo Liu | Mengmeng Liang | ... | Zhi Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 9962029
  • - Research Article

Military Information Leak Response Technology through OSINT Information Analysis Using SNSes

Yong-Joon Lee | Se-Joon Park | Won-Hyung Park
  • Special Issue
  • - Volume 2022
  • - Article ID 2196998
  • - Research Article

ASD: ARP Spoofing Detector Using OpenWrt

Yeonseon Jeong | Hyunghoon Kim | Hyo Jin Jo
  • Special Issue
  • - Volume 2022
  • - Article ID 7697863
  • - Research Article

Research on Anti-Alzheimer’s Traditional Chinese Medicine with Data Security: Datasets, Methods, and Evaluation

Peng Tang | Yubin Zheng | ... | Zheng Huang
  • Special Issue
  • - Volume 2022
  • - Article ID 5428539
  • - Research Article

CL-BC: A Secure Data Storage Model for Social Networks

Dawei Xu | Weiqi Wang | ... | Jiaqi Gao
  • Special Issue
  • - Volume 2022
  • - Article ID 5226390
  • - Research Article

Crystals-Dilithium on ARMv8

Youngbeom Kim | Jingyo Song | ... | Seog Chung Seo
  • Special Issue
  • - Volume 2022
  • - Article ID 3286623
  • - Research Article

Detecting Illegal Online Gambling (IOG) Services in the Mobile Environment

Moohong Min | Jemin J. Lee | Kyungho Lee
  • Special Issue
  • - Volume 2022
  • - Article ID 3842077
  • - Research Article

An Effective Credit Evaluation Mechanism with Softmax Regression and Blockchain in Power IoT

Da Li | Dong Wang | ... | Linna Ruan
  • Special Issue
  • - Volume 2022
  • - Article ID 4322148
  • - Research Article

Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN

Wansoo Kim | Jungho Lee | ... | Samuel Woo
  • Special Issue
  • - Volume 2022
  • - Article ID 3686423
  • - Review Article

Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network

Se-Joon Park | Yong-Joon Lee | Won-Hyung Park
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.