Security and Communication Networks

Communication Security in Socialnet-Oriented Cyber Spaces 2021


Publishing date
01 Jun 2022
Status
Closed
Submission deadline
28 Jan 2022

Lead Editor

1Soonchunhyang University, Asan, Republic of Korea

2Luleå University of Technology, Luleå, Sweden

3Nankai University, Tianjin, China

4Zhejiang Normal University, Jinhua, China

5University of Massachusetts Dartmouth, Dartmouth, USA

This issue is now closed for submissions.

Communication Security in Socialnet-Oriented Cyber Spaces 2021

This issue is now closed for submissions.

Description

With the advent of the Internet of Everything, social networks are playing an important role that has the potential to revolutionize the interconnection and interdependence of networks. It is foreseeable that social net service will be the most common approach of the next generation of internet technology. Billions of social network users share their personal data with various devices over the Internet daily. It is undeniable that social network websites and applications facilitate everyone's daily life and enormously expand their social networks.

However, the threats associated with social networks should never be overlooked. Among these are communication security problems, which lead to various attacks including the dissemination of malicious code and the leakage of critical personal information. In recent years, increasing numbers of researchers have been developing advanced techniques to analyze, detect, and prevent these potential threats such as Sybil attacks and Social spam. The goal of this Special Issue is to promote research on communication security in social networks. This topic is mainly for the research of communication security in social network architecture. How to ensure security in communication services for social networks has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide.

The aim of this Special Issue is to provide a platform to share up-to-date scientific achievements in this field. Authors are invited to submit original research and review articles focused on the latest findings in security issues in social networks. Research that highlights potential defence approaches and strategies to enhance communication security on social networks or similar networks is particularly encouraged.

Potential topics include but are not limited to the following:

  • Data security for mobile internet and social networks
  • Big data analysis for mobile internet and social networks
  • Privacy protection in mobile internet and social networks
  • Reliability analysis for social networks and IoT
  • Data mining, knowledge discovery and machine learning for social networks
  • Distributed system security for mobile internet and social computing
  • Authentication and key exchange for mobile internet and social computing
  • Security protocol and formal analysis for social networks and IoT
  • Anonymous communication in mobile internet
  • Trusted computing and trustworthy computing for social networks
  • Blockchain applications for social networks
  • Human factor of cyber security
  • Human-centred security
  • Cyber crime in mobile social networks
  • Cybersecurity awareness

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 4714899
  • - Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Minsoo Lee | Hyun Kwon | Hyunsoo Yoon
  • Special Issue
  • - Volume 2022
  • - Article ID 5755785
  • - Research Article

User Authentication Method via Speaker Recognition and Speech Synthesis Detection

Hyun Park | TaeGuen Kim
  • Special Issue
  • - Volume 2021
  • - Article ID 2843856
  • - Research Article

Network Intrusion Detection with Nonsymmetric Deep Autoencoding Feature Extraction

Zhaojun Gu | Liyin Wang | ... | Zhi Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 6330828
  • - Research Article

ACAMA: Deep Learning-Based Detection and Classification of Android Malware Using API-Based Features

Eunbyeol Ko | Jinsung Kim | ... | Jeong Hyun Yi
  • Special Issue
  • - Volume 2021
  • - Article ID 8066200
  • - Research Article

Can Wavelet Transform Detect LDDoS Abnormal Traffic in Multipath TCP Transmission System?

Gang Lei | Lejun Ji | ... | Hao Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 7206179
  • - Research Article

Publishing Triangle Counting Histogram in Social Networks Based on Differential Privacy

Tianzi Lv | Huanzhou Li | ... | Jian Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 2356284
  • - Research Article

Disguise of Steganography Behaviour: Steganography Using Image Processing with Generative Adversarial Network

Mingjie Li | Zichi Wang | ... | Yong Liu
  • Special Issue
  • - Volume 2021
  • - Article ID 3294610
  • - Review Article

Survey on Astroturfing Detection and Analysis from an Information Technology Perspective

Tong Chen | Jiqiang Liu | ... | Wei Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 2291470
  • - Research Article

Secure Symmetric Keyword Search with Keyword Privacy for Cloud Storage Services

Taek-Young Youn | Hyun Sook Rhee
  • Special Issue
  • - Volume 2021
  • - Article ID 6952869
  • - Research Article

Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices

Yongli Tang | Ying Li | ... | Yuanhong Li
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

Article of the Year Award: Impactful research contributions of 2022, as selected by our Chief Editors. Discover the winning articles.