S-IoT(SN) 2020 : SECURITY IN IOT SOCIAL NETWORKS
Call For Papers
Background and Purpose
This book addresses new aspects in security and vulnerability in the present day social information networks. Additionally, this book also will introduce a new chapter on various approaches of resolving deception in social information networks. Also, it covers topics such as Public structure of large networks, Structural Analysis of Networks and Cascading behavior in networks. Further, this book also dives into the security and privacy mechanisms, protocols and models in social information networks.
Researchers and practitioners are invited to submit a 2 - 3 page chapter proposal by December 5, 2019 to the editors (email address: email@example.com & firstname.lastname@example.org). The proposals should contain proposed title of the chapter, mission of the chapter, table of contents, full details of authors, their affiliations, and contact details. Authors of accepted proposals will be notified by December 12, 2019 about the status of their proposals along with chapter writing guidelines. Full chapters are expected to be submitted by January 24, 2020, published in Elsevier.
Keywords : Social networks, Deception Detection techniques, Security, Data Privacy, Security mechanisms, Structural Analysis of Networks, Cascading behavior in networks, Public structure of large networks, Models of network evolution
December 1, 2019 : Proposal Submission Deadline
December 12, 2019 : Notification of Acceptance of proposals
January 24, 2020 : Full Chapter Submission
February 15, 2020 : Review Result Returned
February 24, 2020 : Revised Chapter Submission
March 1, 2020 : Final Acceptance Notification
March 5, 2020 : Final Chapter Submission
Table of Contents
Providing the intended contents of the book for your kind preparation.
Chapter1 : Security Issues and Technical Challenges in Social Information Networks
Chapter2 : Emerging Social Information Networks Applications and Architectures
Chapter 3 : Optimized Security Models for Social Information Networks
Chapter4 : Influence of social information networks and its propagation
Chapter5 : Pragmatic studies of diffusion in networks
Chapter6 : Forensic Analysis in Social Networking Applications
Chapter7 : Recommender Systems – Security Threats and Mechanisms
Chapter8 : Evolving Cloud Security Technologies for Social Networks
Chapter9 : Deception detection techniques for Fake news in social networks
Fadi Al-Turjman1, B D Deebak2
1Artificial Intelligence Department, Near East University, Nicosia, Mersin 10, Turkey
2School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India.
Email address: email@example.com & firstname.lastname@example.org