Wireless Communications and Mobile Computing

Models, Technologies, and Applications of Intelligent Defense in Ubiquitous Network Environments


Publishing date
01 Nov 2022
Status
Published
Submission deadline
08 Jul 2022

Lead Editor
Guest Editors

1University of Otago, Dunedin, New Zealand

2Henan University, Kaifeng, China

3North China University of Water Resources and Electric Power, Zhengzhou, China


Models, Technologies, and Applications of Intelligent Defense in Ubiquitous Network Environments

Description

With the continuous evolution and wide application of communication technology, network technology, and computing technology, a ubiquitous network environment has been formed, including the Internet, Internet of Things (IoT), and other heterogeneous interconnections. Ubiquitous networks have the characteristics of openness, heterogeneity, and mobility, and can provide diverse and personalized information services at different levels, helping realize the interconnection of all things and the intercommunication of wisdom.

Ubiquitous networks re deeply integrated with the industrial economy, connecting people, machines, things, and systems, which is then called the ubiquitous industrial Internet of Things (IIoT). Many new manufacturing and service systems covering the whole industry chain and the whole value chain have been built, which are regarded as an important foundation of the fourth industrial revolution. Due to the openness, heterogeneity, mobility, and dynamics of the ubiquitous industrial Internet of Things, there exist numerous threats. Information security technologies, such as identity authentication, access control, auditing, situational awareness, and malicious code monitoring, need to be able to identify the risks and threats posed by the above features, so as to update the security policies in time. Traditional information security methods struggle to meet the requirements of ubiquitous networks in terms of diversity, heterogeneity, dynamics, mobility, and openness. Therefore, a series of dynamic and adaptive intelligent defense technologies based on machine learning methods have recently attracted widespread attention.

The aim of this Special Issue is to discuss intelligent defense models, technologies, and applications based on machine learning in the ubiquitous IIoT. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Malicious code intelligent countermeasure techniques in IIoT
  • Risk adaptive access control and dynamic access control methods based on machine learning methods in the ubiquitous IoT
  • Ubiquitous network attack and defense techniques based on deep learning models
  • Automatic generation techniques for access control policy in IIoT
  • Access control methods based on smart contracts in IoT block chains
  • Intelligent identity authentication techniques in 5G networks
  • Automated role engineering methods based on machine learning
  • Ubiquitous network intelligent intrusion detection techniques based on machine learning
  • Software reverse engineering and malicious code detection methods based on machine learning
  • Advances in intrusion detection, information fusion, resource allocation, and optimal scheduling of new cyber-physical systems, such as Internet of Vehicles (IoV) and ubiquitous power Internet of Things

Articles

  • Special Issue
  • - Volume 2023
  • - Article ID 9785959
  • - Retraction

Retracted: Intelligent Application of Raw Material Supply Chain Planning System Based on Genetic Algorithm

Wireless Communications and Mobile Computing
  • Special Issue
  • - Volume 2023
  • - Article ID 4386621
  • - Research Article

A Network Key Node Identification Method Based on Improved Multiattribute Fusion

Bo Chen | Rui Tong | ... | Hang Tao
  • Special Issue
  • - Volume 2023
  • - Article ID 2854874
  • - Research Article

KC-GCN: A Semi-Supervised Detection Model against Various Group Shilling Attacks in Recommender Systems

Hongyun Cai | Jichao Ren | ... | Jie Meng
  • Special Issue
  • - Volume 2023
  • - Article ID 9212269
  • - Research Article

A Smart Contract Vulnerability Detection Model Based on Syntactic and Semantic Fusion Learning

Daojun Han | Qiuyue Li | ... | Tao Xu
  • Special Issue
  • - Volume 2022
  • - Article ID 2515962
  • - Research Article

Modeling and Analysis of Group User Portrait through WeChat Mini Program

Guangmin Li | Wenjing Chen | ... | Li Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 1096467
  • - Research Article

Tunnel Lining Defect Identification Method Based on Small Sample Learning

Anfu Zhu | Congxiao Ma | ... | Heng Guo
  • Special Issue
  • - Volume 2022
  • - Article ID 5054529
  • - Research Article

[Retracted] Intelligent Application of Raw Material Supply Chain Planning System Based on Genetic Algorithm

Feng Xu | Yu-Meng Zhang | ... | Jia-Ming Zhu
  • Special Issue
  • - Volume 2022
  • - Article ID 4095481
  • - Research Article

SROBR: Semantic Representation of Obfuscation-Resilient Binary Code

Ke Tang | Zheng Shan | ... | Hairen Gui
  • Special Issue
  • - Volume 2022
  • - Article ID 8641220
  • - Research Article

NC-GNN: Consistent Neighbors of Nodes Help More in Graph Neural Networks

Ming Xu | Baoming Zhang | ... | Chongjun Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 9905114
  • - Research Article

Mining and Application of Tourism Online Review Text Based on Natural Language Processing and Text Classification Technology

Hongsheng Xu | Yanqing Lv
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.