[AISWorld] CFP: Special Issue of Security and Communication Networks on Characterization and Detection of Fakes, Spammers, and Bots in Social and Communication Networks

Stefano Cresci stefano.cresci at iit.cnr.it
Mon Oct 15 04:08:32 EDT 2018


[apologies if you receive multiple copies]

Security and Communication Networks
Special Issue on Characterization and Detection of Fakes, Spammers,
and Bots in Social and Communication Networks

Deadline for submission: January 18, 2019
Publication date: June, 2019

This special issue focuses on authentication techniques, access
control mechanisms, network traffic analysis,
and novel detection techniques for malicious users/nodes in
social/communication networks.

Online social networks, and in general, communication networks, are a
crucial component in the public sphere, enhancing communications,
fostering discussions, and influencing the public perception for a
myriad of issues. However, social and communication networks have
become the ideal stage for the proliferation of fictitious and
malicious accounts, including bots and botnets. Efficient detection of
such malicious nodes in social and communication networks has thus
become one of the most pressing contemporary challenges. Particular
emphasis should be given to the design of flexible and scalable
techniques capable of dealing with different types of malicious nodes
in large-scale analyses. We also encourage studies assessing the
consequences of malicious actions. Finally, novel approaches to the
collection and annotation of large ground-truth datasets are also
welcomed.

Topics of interest include (but are not limited to) the following:

- Authentication techniques to discriminate between legitimate and
malicious nodes
- Access control mechanisms that prevent data disclosure hosted in
social and communication networks to possible bots
- Machine learning-based detection techniques for malicious nodes
- Network analysis techniques for characterization and detection of
malicious nodes
- Online behavioral modeling for the detection of anomalous behaviors
- Techniques for detecting groups of synchronized and coordinated
malicious nodes
- Techniques for detecting evolving/evading malicious nodes

Guest Editors:

- Maurizio Tesconi (m.tesconi at iit.cnr.it), IIT-CNR, Pisa, Italy
- Stefano Cresci (s.cresci at iit.cnr.it), IIT-CNR, Pisa, Italy
- Roberto Di Pietro (rdipietro at hbku.edu.qa), Hamad Bin Khalifa
University, Doha, Qatar
- Mueen Abdullah (mueen at unm.edu), University of New Mexico, Albuquerque, USA

More information:

https://www.hindawi.com/journals/scn/si/985904/cfp/

--
*Stefano Cresci*

Institute of Informatics and Telematics (IIT)
National Research Council (CNR)
Via Giuseppe Moruzzi, 1
56124 Pisa (Italy)

Phone: *+39 050 315 8272*
Mobile: *+39 328 1330773*
Skype: *mystic_ste*
Web:* http://www.iit.cnr.it/stefano.cresci
<http://www.iit.cnr.it/stefano.cresci>*
Twitter: *@s_cresci <https://twitter.com/s_cresci>*


More information about the AISWorld mailing list