Security and Communication Networks

Big Data-Driven Multimedia Analytics for Cyber Security


Publishing date
01 Sep 2021
Status
Closed
Submission deadline
14 May 2021

Lead Editor

1Tianjin University, Tianjin, China

2Nanjing Institute of Technology, Nanjing, China

3Curtin University, Perth, Australia

4Islamic University of Technology, Dhaka, Bangladesh

This issue is now closed for submissions.
More articles will be published in the near future.

Big Data-Driven Multimedia Analytics for Cyber Security

This issue is now closed for submissions.
More articles will be published in the near future.

Description

In the past decade, rapid developments in mass storage architectures and sensing technologies, such as the emergence of social networking websites and wearable devices, have brought about the phenomenon of big data, which involves zettabytes of data being produced every day. New research opportunities and challenges for multimedia content analysis have arisen. Many big data modelling methods, computing algorithms, and signal processing technologies have recently been successfully developed and applied to multimedia social and personal content analysis: for example, multi-view learning algorithms have been proposed for exploring the variety of multimedia content, sparse and manifold learning have been developed for high-dimensional multimedia data representation, deep learning has produced promising results in large scale multimedia retrieval, and compressive sensing and new sampling schemes have been investigated for big data analytics.

The ability to process these unprecedented amounts of data in real time using multimedia analytics tools brings many benefits that can be utilised in cyber threat analysis systems. Cyber threat analysts and intrusion detection/prevention systems can discover useful information in real time by making use of big data collected from networks, computers, sensors, and cloud systems. This information can help detect system vulnerabilities and attacks that are becoming increasingly prevalent and help develop security solutions accordingly. Big data-driven multimedia analytics are effective for security solutions, as features of big data-driven multimedia techniques can discover anomalies and attack patterns as fast as possible, limiting the vulnerability of the systems and increasing their resilience. Motivated by the inclination to collect a set of recent advances and results in these related topics, provide a platform for researchers to exchange their innovative ideas on security and privacy models and techniques for social/personal multimedia analytics, and introduce interesting utilisations of methods and schema for particular social/personal media applications.

The aim of this Special Issue is to attract a broad range of submissions on the development and use of big data-driven multimedia analytics for security and privacy techniques. Motivated by the inclination to collect a set of recent advances and results in these related topics, we aim to provide a platform for researchers to exchange their innovative ideas on security and privacy models and techniques for social/personal multimedia analytics, and introduce interesting utilisations of methods and schema for particular social/personal media applications. Both original research and review articles are welcome, including papers on theoretical advances in security and privacy, as well as algorithm developments in big data technology for media analytics problems

Potential topics include but are not limited to the following:

  • Big data-driven multimedia analytics for intrusion detection
  • Big data analytics for cloud system security
  • Visualisation with big data multimedia analytics
  • Malware detection using big data multimedia analytics
  • Cyber threat intelligence using big data multimedia analytics
  • Big data processing architectures for threat detection
  • Advanced persistent threat (APT) detection techniques in big data multimedia analytics
  • Machine learning algorithms for effective detection of cyber-attacks with big data multimedia analytics
  • Representation of cyber-attack data for cross-platform processing
  • Network forensics using big data analytics
  • Stream data processing for real-time threat analysis
  • Zero-day attack detection using big data analytics
  • Big data technology for multimedia indexing and retrieval
  • Secure big data technology for multimedia analytics
  • Scientific programming for multimedia data processing

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 2824146
  • - Research Article

Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform

Chuan Mou | Ye Cheng
  • Special Issue
  • - Volume 2021
  • - Article ID 9960822
  • - Research Article

Malicious Encryption Traffic Detection Based on NLP

Hao Yang | Qin He | ... | Qian Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 3676720
  • - Research Article

SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block

Guiyong Xu | Yang Xu | ... | Xiaoyao Xie
  • Special Issue
  • - Volume 2021
  • - Article ID 5542993
  • - Research Article

Research on Calibration Method of Binocular Vision System Based on Neural Network

Hao Zhu | Mulan Wang | Weiye Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 9968652
  • - Research Article

Quantitative Weighted Visual Cryptographic (k, m, n) Method

Yewen Wu | Shi Zeng | ... | Xianyi Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 5595243
  • - Research Article

Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

Yanfeng Shi | Shuo Qiu
  • Special Issue
  • - Volume 2021
  • - Article ID 5556634
  • - Research Article

Improved CNN-Based Hashing for Encrypted Image Retrieval

Wenyan Pan | Meimin Wang | ... | Zhili Zhou
  • Special Issue
  • - Volume 2021
  • - Article ID 6635027
  • - Research Article

Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms

Lejun Gong | Xingxing Zhang | ... | Li Zhang
  • Special Issue
  • - Volume 2020
  • - Article ID 6679022
  • - Research Article

Research on Multidomain Authentication of IoT Based on Cross-Chain Technology

Dawei Li | Jia Yu | ... | Najla Al-Nabhan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
Acceptance rate31%
Submission to final decision85 days
Acceptance to publication42 days
CiteScore4.200
Journal Citation Indicator0.370
Impact Factor1.791
 Submit

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.