| |||||||||||||||||
S-IoT(SN) 2020 : SECURITY IN IOT SOCIAL NETWORKS | |||||||||||||||||
| |||||||||||||||||
Call For Papers | |||||||||||||||||
Background and Purpose
This book addresses new aspects in security and vulnerability in the present day social information networks. Additionally, this book also will introduce a new chapter on various approaches of resolving deception in social information networks. Also, it covers topics such as Public structure of large networks, Structural Analysis of Networks and Cascading behavior in networks. Further, this book also dives into the security and privacy mechanisms, protocols and models in social information networks. Researchers and practitioners are invited to submit a 2 - 3 page chapter proposal by December 5, 2019 to the editors (email address: alturjman@outlook.com & deebak.bd@vit.ac.in). The proposals should contain proposed title of the chapter, mission of the chapter, table of contents, full details of authors, their affiliations, and contact details. Authors of accepted proposals will be notified by December 12, 2019 about the status of their proposals along with chapter writing guidelines. Full chapters are expected to be submitted by January 24, 2020, published in Elsevier. Keywords : Social networks, Deception Detection techniques, Security, Data Privacy, Security mechanisms, Structural Analysis of Networks, Cascading behavior in networks, Public structure of large networks, Models of network evolution Important Dates December 1, 2019 : Proposal Submission Deadline December 12, 2019 : Notification of Acceptance of proposals January 24, 2020 : Full Chapter Submission February 15, 2020 : Review Result Returned February 24, 2020 : Revised Chapter Submission March 1, 2020 : Final Acceptance Notification March 5, 2020 : Final Chapter Submission Table of Contents Providing the intended contents of the book for your kind preparation. Chapter1 : Security Issues and Technical Challenges in Social Information Networks Chapter2 : Emerging Social Information Networks Applications and Architectures Chapter 3 : Optimized Security Models for Social Information Networks Chapter4 : Influence of social information networks and its propagation Chapter5 : Pragmatic studies of diffusion in networks Chapter6 : Forensic Analysis in Social Networking Applications Chapter7 : Recommender Systems – Security Threats and Mechanisms Chapter8 : Evolving Cloud Security Technologies for Social Networks Chapter9 : Deception detection techniques for Fake news in social networks Editor Information Fadi Al-Turjman1, B D Deebak2 1Artificial Intelligence Department, Near East University, Nicosia, Mersin 10, Turkey 2School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India. Email address: alturjman@outlook.com & deebak.bd@vit.ac.in |
|