Security and Communication Networks

Big Data-Driven Multimedia Analytics for Cyber Security


Publishing date
01 Sep 2021
Status
Published
Submission deadline
14 May 2021

Lead Editor

1Tianjin University, Tianjin, China

2Nanjing Institute of Technology, Nanjing, China

3Curtin University, Perth, Australia

4Islamic University of Technology, Dhaka, Bangladesh


Big Data-Driven Multimedia Analytics for Cyber Security

Description

In the past decade, rapid developments in mass storage architectures and sensing technologies, such as the emergence of social networking websites and wearable devices, have brought about the phenomenon of big data, which involves zettabytes of data being produced every day. New research opportunities and challenges for multimedia content analysis have arisen. Many big data modelling methods, computing algorithms, and signal processing technologies have recently been successfully developed and applied to multimedia social and personal content analysis: for example, multi-view learning algorithms have been proposed for exploring the variety of multimedia content, sparse and manifold learning have been developed for high-dimensional multimedia data representation, deep learning has produced promising results in large scale multimedia retrieval, and compressive sensing and new sampling schemes have been investigated for big data analytics.

The ability to process these unprecedented amounts of data in real time using multimedia analytics tools brings many benefits that can be utilised in cyber threat analysis systems. Cyber threat analysts and intrusion detection/prevention systems can discover useful information in real time by making use of big data collected from networks, computers, sensors, and cloud systems. This information can help detect system vulnerabilities and attacks that are becoming increasingly prevalent and help develop security solutions accordingly. Big data-driven multimedia analytics are effective for security solutions, as features of big data-driven multimedia techniques can discover anomalies and attack patterns as fast as possible, limiting the vulnerability of the systems and increasing their resilience. Motivated by the inclination to collect a set of recent advances and results in these related topics, provide a platform for researchers to exchange their innovative ideas on security and privacy models and techniques for social/personal multimedia analytics, and introduce interesting utilisations of methods and schema for particular social/personal media applications.

The aim of this Special Issue is to attract a broad range of submissions on the development and use of big data-driven multimedia analytics for security and privacy techniques. Motivated by the inclination to collect a set of recent advances and results in these related topics, we aim to provide a platform for researchers to exchange their innovative ideas on security and privacy models and techniques for social/personal multimedia analytics, and introduce interesting utilisations of methods and schema for particular social/personal media applications. Both original research and review articles are welcome, including papers on theoretical advances in security and privacy, as well as algorithm developments in big data technology for media analytics problems

Potential topics include but are not limited to the following:

  • Big data-driven multimedia analytics for intrusion detection
  • Big data analytics for cloud system security
  • Visualisation with big data multimedia analytics
  • Malware detection using big data multimedia analytics
  • Cyber threat intelligence using big data multimedia analytics
  • Big data processing architectures for threat detection
  • Advanced persistent threat (APT) detection techniques in big data multimedia analytics
  • Machine learning algorithms for effective detection of cyber-attacks with big data multimedia analytics
  • Representation of cyber-attack data for cross-platform processing
  • Network forensics using big data analytics
  • Stream data processing for real-time threat analysis
  • Zero-day attack detection using big data analytics
  • Big data technology for multimedia indexing and retrieval
  • Secure big data technology for multimedia analytics
  • Scientific programming for multimedia data processing

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 2824146
  • - Research Article

Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform

Chuan Mou | Ye Cheng
  • Special Issue
  • - Volume 2021
  • - Article ID 9960822
  • - Research Article

Malicious Encryption Traffic Detection Based on NLP

Hao Yang | Qin He | ... | Qian Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 3676720
  • - Research Article

SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block

Guiyong Xu | Yang Xu | ... | Xiaoyao Xie
  • Special Issue
  • - Volume 2021
  • - Article ID 5542993
  • - Research Article

Research on Calibration Method of Binocular Vision System Based on Neural Network

Hao Zhu | Mulan Wang | Weiye Xu
  • Special Issue
  • - Volume 2021
  • - Article ID 9968652
  • - Research Article

Quantitative Weighted Visual Cryptographic (k, m, n) Method

Yewen Wu | Shi Zeng | ... | Xianyi Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 5595243
  • - Research Article

Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT

Yanfeng Shi | Shuo Qiu
  • Special Issue
  • - Volume 2021
  • - Article ID 5556634
  • - Research Article

Improved CNN-Based Hashing for Encrypted Image Retrieval

Wenyan Pan | Meimin Wang | ... | Zhili Zhou
  • Special Issue
  • - Volume 2021
  • - Article ID 6635027
  • - Research Article

Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms

Lejun Gong | Xingxing Zhang | ... | Li Zhang
  • Special Issue
  • - Volume 2020
  • - Article ID 6679022
  • - Research Article

Research on Multidomain Authentication of IoT Based on Cross-Chain Technology

Dawei Li | Jia Yu | ... | Najla Al-Nabhan
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.