Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Multimedia Data and Network Security

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "ICT Infrastructures for Cybersecurity".

Deadline for manuscript submissions: 28 February 2025 | Viewed by 672

Special Issue Editor


E-Mail Website
Guest Editor
Department of Network and Computer Security, State University of New York Polytechnic Institute, C135, Kunsela Hall, Utica, NY 13502, USA
Interests: machine learning and computer vision with applications to cybersecurity; biometrics; deepfakes; affect recognition; image and video processing; perceptual-based audiovisual multimedia quality assessment

Special Issue Information

Dear Colleagues,

In the digital era, multimedia data have become integral to our daily lives, permeating various platforms and networks. The multimedia data proliferation coupled with the increasing complexity of network infrastructures has brought unprecedented challenges and opportunities in the realm of security and integrity of such data and networks. This Special Issue aims to explore the pressing challenges and innovations in protecting multimedia data and the networks through which it is transmitted. This Special Issue seeks high-quality, original research contributions that present cutting-edge methodologies, frameworks, and technologies designed to enhance multimedia data security. By bringing together researchers, academicians, and practitioners, this Special Issue aspires to foster the dissemination of the latest findings, stimulate innovative ideas, and shape future research directions in the field of multimedia data and network security. We welcome your valuable contributions to this crucial discourse.

Dr. Zahid Akhtar
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • multimedia security
  • network security
  • data encryption
  • digital watermarking
  • steganography
  • content protection
  • cryptography
  • secure multimedia communication
  • secure multimedia streaming
  • multimedia forensics
  • network intrusion detection
  • secure data transmission
  • multimedia authentication
  • secure multimedia storage
  • multimedia privacy
  • new transmission protocols
  • blockchain technology
  • privacy preserving multimedia processing
  • deep fake detection and mitigation
  • secure communication in wireless and mobile networks
  • threat modeling and risk assessment
  • security in IoT and smart networks
  • cross-layer security mechanisms for multimedia and network integration
  • AI and machine learning applications in multimedia and network security
  • case studies and real-world applications of integrated security solutions

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 1079 KiB  
Article
A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases
by Mohammad Almseidin, Maen Alzubi, Jamil Al-Sawwa, Mouhammd Alkasassbeh and Mohammad Alfraheed
Computers 2024, 13(11), 291; https://doi.org/10.3390/computers13110291 - 8 Nov 2024
Viewed by 450
Abstract
Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because [...] Read more.
Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because of their ability to measure the degree of attacks instead of making a binary decision. Furthermore, fuzzy systems offer a suitable environment that is able to deal with uncertainty. However, fuzzy systems face a critical challenge represented by the sparse fuzzy rules. Typical fuzzy systems demand complete fuzzy rules in order to offer the required results. Additionally, generating complete fuzzy rules can be difficult due to many factors, such as a lack of knowledge base or limited data availability, such as in IDS applications. Fuzzy rule interpolation (FRI) was introduced to overcome this limitation by generating the required interpolation results in cases with sparse fuzzy rules. This work introduces a threefold approach designed to address the cases of missing fuzzy rules, which uses a few fuzzy rules to handle the limitations of missing fuzzy rules. This is achieved by finding the interpolation condition of neighboring fuzzy rules. This procedure was accomplished based on the concept of factors (which determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in cases of missing fuzzy rules). The evaluation procedure for the threefold approach was conducted using the following two steps: firstly, using the FRI benchmark numerical metrics, the results demonstrated the ability of the threefold approach to generate the required results for the various benchmark scenarios. Secondly, using a real-life dataset (phishing attacks dataset), the results demonstrated the effectiveness of the suggested approach to handle cases of missing fuzzy rules in the area of phishing attacks. Consequently, the suggested threefold approach offers an opportunity to reduce the number of fuzzy rules effectively and generate the required results using only a few fuzzy rules. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Figure 1

Figure 1
<p>The triangular membership function.</p>
Full article ">Figure 2
<p>The interpolation conditions extraction procedure based on the factor parameters.</p>
Full article ">Figure 3
<p>The general architecture of the proposed threefold approach.</p>
Full article ">Figure 4
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (1).</p>
Full article ">Figure 5
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (2).</p>
Full article ">Figure 6
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (3).</p>
Full article ">Figure 7
<p>The results of the threefold approach evaluation compared to other FRI methods [<a href="#B22-computers-13-00291" class="html-bibr">22</a>,<a href="#B25-computers-13-00291" class="html-bibr">25</a>], based on benchmark metric (4).</p>
Full article ">Figure 8
<p>The results of the threefold approach in the case of missing fuzzy rules (part 1).</p>
Full article ">Figure 9
<p>The results of the threefold approach in the case of missing fuzzy rules (part 2).</p>
Full article ">Figure 10
<p>The performance metrics of suggested threefold approach for the phishing attack dataset.</p>
Full article ">
Back to TopTop