社会网络安全调查:攻击检测、评估、挑战和未来展望的技术

IF 4.9 Q1 PSYCHOLOGY, EXPERIMENTAL
Aos Mulahuwaish , Basheer Qolomany , Kevin Gyorick , Jacques Bou Abdo , Mohammed Aledhari , Junaid Qadir , Kathleen Carley , Ala Al-Fuqaha
{"title":"社会网络安全调查:攻击检测、评估、挑战和未来展望的技术","authors":"Aos Mulahuwaish ,&nbsp;Basheer Qolomany ,&nbsp;Kevin Gyorick ,&nbsp;Jacques Bou Abdo ,&nbsp;Mohammed Aledhari ,&nbsp;Junaid Qadir ,&nbsp;Kathleen Carley ,&nbsp;Ala Al-Fuqaha","doi":"10.1016/j.chbr.2025.100668","DOIUrl":null,"url":null,"abstract":"<div><div>In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.</div></div>","PeriodicalId":72681,"journal":{"name":"Computers in human behavior reports","volume":"18 ","pages":"Article 100668"},"PeriodicalIF":4.9000,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects\",\"authors\":\"Aos Mulahuwaish ,&nbsp;Basheer Qolomany ,&nbsp;Kevin Gyorick ,&nbsp;Jacques Bou Abdo ,&nbsp;Mohammed Aledhari ,&nbsp;Junaid Qadir ,&nbsp;Kathleen Carley ,&nbsp;Ala Al-Fuqaha\",\"doi\":\"10.1016/j.chbr.2025.100668\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.</div></div>\",\"PeriodicalId\":72681,\"journal\":{\"name\":\"Computers in human behavior reports\",\"volume\":\"18 \",\"pages\":\"Article 100668\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2025-04-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers in human behavior reports\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2451958825000831\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PSYCHOLOGY, EXPERIMENTAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers in human behavior reports","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2451958825000831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PSYCHOLOGY, EXPERIMENTAL","Score":null,"Total":0}
引用次数: 0

摘要

在当今这个数字互联的时代,理解和解决社交网络安全的细微差别已经变得至关重要。信息安全和网络安全侧重于保护各种形式的敏感数据和数字系统,而社会网络安全则侧重于网络威胁的人类和社会层面。该领域具有独特的定位,可以解决诸如网络欺凌、网络犯罪、垃圾邮件、恐怖活动和社区检测等不同的社会网络安全攻击问题。检测方法在社会网络安全中的重要性被及时和主动响应这些威胁的需求所强调。在这篇全面的评论中,我们深入研究了各种技术、攻击、挑战、潜在的解决方案以及检测社交网络安全攻击领域的趋势。此外,我们探索了随时可用的公共数据集和工具的潜力,这些数据集和工具可以加快这一重要领域的研究。我们的目标不仅是解决现有的挑战,还要为未来的探索指明潜在的途径。通过这项调查,我们的主要重点是为快速发展的社会网络安全领域提供有价值的见解。通过这样做,我们的目标是协助研究人员和从业人员开发有效的预测模型,增强防御策略,并最终培育一个更安全的数字环境。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
7.80
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信