Security and Communication Networks

Communication Security in Socialnet-Oriented Cyber Spaces


Publishing date
01 Aug 2021
Status
Published
Submission deadline
19 Mar 2021

Lead Editor

1Soonchunhyang University, Asan, Republic of Korea

2Luleå University of Technology, Luleå, Sweden

3Nankai University, Tianjin, China

4Zhejiang Normal University, Jinhua, China


Communication Security in Socialnet-Oriented Cyber Spaces

Description

With the advent of the Internet of Everything, social networks are playing an important role that has the potential to revolutionize the interconnection and interdependence of networks. It is foreseeable that social net service will be the most common approach of the next generation of internet technology. Billions of social network users share their personal data with various devices over the Internet daily. It is undeniable that social network websites and applications facilitate everyone's daily life and enormously expand their social networks.

However, the threats associated with social networks should never be overlooked. Among these are communication security problems, which lead to various attacks including the dissemination of malicious code and the leakage of critical personal information. In recent years, increasing numbers of researchers have been developing advanced techniques to analyze, detect, and prevent these potential threats such as Sybil attacks and Social spam. The goal of this Special Issue is to promote research on communication security in social networks. This topic is mainly for the research of communication security in social network architecture. How to ensure security in communication services for social networks has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide.

The aim of this Special Issue is to provide a platform to share up-to-date scientific achievements in this field. Authors are invited to submit original research and review articles focused on the latest findings in security issues in social networks. Research that highlights potential defence approaches and strategies to enhance communication security on social networks or similar networks is particularly encouraged.

Potential topics include but are not limited to the following:

  • Data security for mobile internet and social networks
  • Big data analysis for mobile internet and social networks
  • Privacy protection in mobile internet and social networks
  • Reliability analysis for social networks and IoT
  • Data mining, knowledge discovery and machine learning for social networks
  • Distributed system security for mobile internet and social computing
  • Authentication and key exchange for mobile internet and social computing
  • Security protocol and formal analysis for social networks and IoT
  • Anonymous communication in mobile internet
  • Trusted computing and trustworthy computing for social networks
  • Blockchain applications for social networks
  • Human factor of cyber security
  • Human-centred security
  • Cyber crime in mobile social networks
  • Cybersecurity awareness
  • Software vulnerability and backdoors for mobile social networks
  • Safety management for social networks

Articles

  • Special Issue
  • - Volume 2021
  • - Article ID 6669429
  • - Research Article

Design and Implementation of Continuous Authentication Mechanism Based on Multimodal Fusion Mechanism

Jianfeng Guan | Xuetao Li | Ying Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 5536865
  • - Research Article

Task Price Prediction Based on Clustering and DNN in Crowdsensing

Bing Jia | Xi Luo | ... | Yan Jia
  • Special Issue
  • - Volume 2021
  • - Article ID 5553874
  • - Research Article

Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain

Zilin Qiang | Yingsen Wang | ... | Zijuan Zhao
  • Special Issue
  • - Volume 2021
  • - Article ID 5560185
  • - Research Article

Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy

Renjie Zhou | Xiao Wang | ... | Sanyuan Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 9963829
  • - Research Article

Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms

Yuanlong Cao | Ruiwen Ji | ... | Wei Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 5593363
  • - Research Article

Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model

Ke Yuan | Yahui Wang | ... | Chunfu Jia
  • Special Issue
  • - Volume 2021
  • - Article ID 5533417
  • - Research Article

User Identification Based on Integrating Multiple User Information across Online Social Networks

Wenjing Zeng | Rui Tang | ... | Wenxian Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 9934138
  • - Research Article

Trusted QoS Assurance Approach for Composite Service

Meng Cai | Ying Cui | ... | Han Luo
  • Special Issue
  • - Volume 2021
  • - Article ID 5518528
  • - Research Article

A Malicious URL Detection Model Based on Convolutional Neural Network

Zhiqiang Wang | Xiaorui Ren | ... | Tao Yang
  • Special Issue
  • - Volume 2021
  • - Article ID 5513590
  • - Research Article

A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid

Pan Zhang | Fenggang Lai | ... | Xiao Yu
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.