Security and Communication Networks

Big Data Analytics for Information Security


Status
Published

1Warsaw University of Technology, Warsaw, Poland

2University of Central Florida, Orlando, USA

3Zhengzhou Science and Technology Institute, Zhengzhou, China

4Wuhan University, Wuhan, China


Big Data Analytics for Information Security

Description

Big Data Analytics (BDA) is one of the mainstream technologies that change our perspectives on processing of information. Together with information security, BDA could be an extremely effective tool to learn more about communication and social networks. There will be infinite possibilities to find new methods of tracking cybercrimes using big data from different sources. BDA in information security also changes our thinking about security algorithms; they must change from a small data paradigm to big ones. This special issue is to analyze how the latest trends in this area help learn more about cyberspace and new threats using big data approaches.

Potential topics include but are not limited to the following:

  • New security algorithms for big data
  • Big data in cloud and its security
  • Cryptography and big data
  • New theories and methods of multimedia information hiding in big media data
  • New theories and methods of multimedia steganalysis in big data
  • Advances in privacy preserving machine learning methods in big data
  • Advances in privacy preserving multimedia search and retrieval methods in big data
  • Advances in privacy preserving data mining methods in big data
  • Challenges and new methods of potential unsafe content recognition in big data

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 7657891
  • - Editorial

Big Data Analytics for Information Security

Krzysztof Szczypiorski | Liqiang Wang | ... | Dengpan Ye
  • Special Issue
  • - Volume 2018
  • - Article ID 9410278
  • - Research Article

Secure Virtualization Environment Based on Advanced Memory Introspection

Shuhui Zhang | Xiangxu Meng | ... | Xiaohui Han
  • Special Issue
  • - Volume 2018
  • - Article ID 2593537
  • - Research Article

A Privacy-Preserving Incentive Mechanism for Participatory Sensing Systems

Xiaoguang Niu | Jiawei Wang | ... | Yihao Zhang
  • Special Issue
  • - Volume 2017
  • - Article ID 6097253
  • - Research Article

PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing

Ji Li | Jianghong Wei | ... | Xuexian Hu
  • Special Issue
  • - Volume 2017
  • - Article ID 3910126
  • - Research Article

Privacy-Preserving -Means Clustering under Multiowner Setting in Distributed Cloud Environments

Hong Rong | Huimei Wang | ... | Ming Xian
  • Special Issue
  • - Volume 2017
  • - Article ID 4956386
  • - Research Article

The Concept Drift Problem in Android Malware Detection and Its Solution

Donghui Hu | Zhongjin Ma | ... | Baohong Ling
  • Special Issue
  • - Volume 2017
  • - Article ID 1923476
  • - Research Article

MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data

Zhu Xiangyang | Dai Hua | ... | Li Xiao
  • Special Issue
  • - Volume 2017
  • - Article ID 9289410
  • - Research Article

Building Secure Public Key Encryption Scheme from Hidden Field Equations

Yuan Ping | Baocang Wang | ... | Shengli Tian
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.