Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

SOCIAL WEB (61 journals)

Showing 1 - 58 of 58 Journals sorted alphabetically
ACM Transactions on Social Computing     Hybrid Journal  
ACM Transactions on the Web (TWEB)     Hybrid Journal   (Followers: 3)
American Journal of Information Systems     Open Access   (Followers: 4)
Asiascape : Digital Asia     Hybrid Journal   (Followers: 1)
CCF Transactions on Networking     Hybrid Journal  
Communications in Mobile Computing     Open Access   (Followers: 14)
Computational Social Networks     Open Access   (Followers: 4)
Cyberpolitik Journal     Open Access  
Cyberpsychology, Behavior, and Social Networking     Hybrid Journal   (Followers: 16)
Data Science     Open Access   (Followers: 6)
Digital Library Perspectives     Hybrid Journal   (Followers: 40)
Discover Internet of Things     Open Access   (Followers: 2)
Informação & Informação     Open Access   (Followers: 2)
Information Technology and Libraries     Open Access   (Followers: 312)
Infrastructure Complexity     Open Access   (Followers: 5)
International Journal of Art, Culture and Design Technologies     Full-text available via subscription   (Followers: 10)
International Journal of Bullying Prevention     Hybrid Journal   (Followers: 1)
International Journal of Digital Humanities     Hybrid Journal   (Followers: 3)
International Journal of e-Collaboration     Full-text available via subscription  
International Journal of E-Entrepreneurship and Innovation     Full-text available via subscription   (Followers: 6)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Information Privacy, Security and Integrity     Hybrid Journal   (Followers: 25)
International Journal of Information Technology and Web Engineering     Hybrid Journal   (Followers: 2)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Interactive Mobile Technologies     Open Access   (Followers: 8)
International Journal of Internet and Distributed Systems     Open Access   (Followers: 2)
International Journal of Knowledge Society Research     Full-text available via subscription  
International Journal of Networking and Virtual Organisations     Hybrid Journal   (Followers: 11)
International Journal of Social and Humanistic Computing     Hybrid Journal  
International Journal of Social Computing and Cyber-Physical Systems     Hybrid Journal  
International Journal of Social Media and Interactive Learning Environments     Hybrid Journal   (Followers: 14)
International Journal of Social Network Mining     Hybrid Journal   (Followers: 3)
International Journal of Virtual Communities and Social Networking     Full-text available via subscription   (Followers: 1)
International Journal of Web Based Communities     Hybrid Journal  
International Journal of Web-Based Learning and Teaching Technologies     Hybrid Journal   (Followers: 20)
International Journal on Semantic Web and Information Systems     Hybrid Journal   (Followers: 4)
Internet Technology Letters     Hybrid Journal  
JLIS.it     Open Access   (Followers: 7)
Journal of Cyber Policy     Hybrid Journal   (Followers: 1)
Journal of Digital & Social Media Marketing     Full-text available via subscription   (Followers: 18)
Journal of Social Structure     Open Access   (Followers: 1)
Medicine 2.0     Open Access   (Followers: 2)
Observatorio (OBS*)     Open Access  
Online Social Networks and Media     Hybrid Journal   (Followers: 9)
Policy & Internet     Hybrid Journal   (Followers: 11)
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies     Hybrid Journal  
Redes. Revista Hispana para el Análisis de Redes Sociales     Open Access  
RESET     Open Access  
Scientific Phone Apps and Mobile Devices     Open Access  
Social Media + Society     Open Access   (Followers: 24)
Social Network Analysis and Mining     Hybrid Journal   (Followers: 4)
Social Networking     Open Access   (Followers: 3)
Social Networks     Hybrid Journal   (Followers: 20)
Social Science Computer Review     Hybrid Journal   (Followers: 13)
Synthesis Lectures on the Semantic Web: Theory and Technology     Full-text available via subscription  
Teknokultura. Revista de Cultura Digital y Movimientos Sociales     Open Access  
Terminal     Open Access  
Texto Digital     Open Access  
Similar Journals
Journal Cover
International Journal of Social Computing and Cyber-Physical Systems
Number of Followers: 0  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 2040-0721 - ISSN (Online) 2040-073X
Published by Inderscience Publishers Homepage  [451 journals]
  • Deep learning-based medical expert system for diabetes diagnosis on
           IoT healthcare data

    • Free pre-print version: Loading...

      Authors: K. Vijayaprabakaran, K. Sathiyamurthy, S. Sowmya
      Pages: 177 - 193
      Abstract: Machine learning in internet of things (IoT) plays a vital role in diagnosing diseases and predicting the risk level of health by analysing patient health records. Diabetes has been commonly seen in all age groups of peoples. Early diagnosis of diabetes and proper medication will help the patient live normally for long life. In this study, various machine learning techniques were experimented to diagnose diabetes and the results were compared. In order to diagnose diabetes from the health record of the patient, this work proposes a deep learning-based expert system (DL-Expert sys). The DL-Expert system predicts the risk level of the patient and provides the recommendation of the diet to the patient. The experimental results illustrate that the predictive model using deep learning algorithm of RNN with LSTM achieves higher accuracy than logistic regression, Naive Bayes and neural network.
      Keywords: machine learning simple linear regression; multiple linear regression; logistic regression; Naïve Bayes; recurrent neural network with GRU; recurrent neural network with LSTM
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 177 - 193
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117937
      Issue No: Vol. 2, No. 3 (2021)
       
  • Secure resource sharing in grid system without public key settings

    • Free pre-print version: Loading...

      Authors: K. Vijayaprabakaran, K. Sathiyamurthy, S. Sowmya
      Pages: 194 - 211
      Abstract: Grid system involves the collaborative use of computers, networks, devices, software, databases and interfaces maintained by multiple organisations. Grid security has attracted increasing interests from researchers, as multiple entities in grid system require to deliver different nature of services. Grid security is primarily guided by the grid security infrastructure (GSI) that uses public key cryptography (PKC) for authentication, delegation and resource sharing between the communicating entities. Although GSI provides required security properties to grid system, PKC-based security solution is computationally expensive in comparison to symmetric key operation, in particular resource-constrained environments. In this paper, an authenticated key establishment (AKE) and secure data sharing protocol is presented for grid system security without using public key settings. The proposed protocol extends delegation of resource server and user capability to proxy agents, and revocation of the delegated power. The proposed protocol shows its security strengths and efficiency in comparisons to other related protocols.
      Keywords: grid security; authentication; key establishment; delegation; GSI; grid security infrastructure
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 194 - 211
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117939
      Issue No: Vol. 2, No. 3 (2021)
       
  • Rule based anonymisation against inference attack in social networks

    • Free pre-print version: Loading...

      Authors: Nidhi Desai, Manik Lal Das
      Pages: 212 - 228
      Abstract: Social networks information has evolved as a powerful decision-maker in various facets of society. Meticulous scrutinisation of gigantic volumes of social data provides insightful solutions for forecasting, government policies, societal problems, business and strategic goals. The presence of sensitive information makes social network's information vulnerable to privacy concerns, leading to users' resistance to sharing their information confidently. Recently, inference attack using rule-based mining technique has posed a challenging privacy concern, particularly in social networks. This paper presents rule anonymity, a privacy model against inference attack using rule-based mining techniques in social networks. The proposed model considers adversary with strong knowledge of rule generation. The proposed rule-based anonymisation technique incorporates Rule Anonymity and ensures a strong privacy guarantee against an adversary with rule mining capability. The experimental results of the proposed anonymisation technique manifest the idea of rule anonymity on the social dataset.
      Keywords: social networks; data privacy; rule mining; inference attack; anonymity; privacy-preserving; social networks data publishing; adversarial model
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 212 - 228
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117952
      Issue No: Vol. 2, No. 3 (2021)
       
  • Detecting malicious users in the social networks using machine learning
           approach

    • Free pre-print version: Loading...

      Authors: H.L. Gururaj, U. Tanuja, V. Janhavi, B. Ramesh
      Pages: 229 - 243
      Abstract: Social networking plays a very important role in today's life. It helps to share ideas, information, multimedia messages and also provides the means of communication between the users. The popular social medias such as Facebook, Twitter, Instagram, etc., where the billions of data are being created in huge volume. Every user has their right to use any social media and a large number of users allowed malicious users by providing private or sensitive information, which results in security threats. In this research, they are proposing an natural language processing (NLP) technique to find suspicious users based on the daily conversations between the users. They demonstrated the behaviour of each user through their anomaly activities. Another machine learning technique called support vector machine (SVM) classifiers to detect the toxic comments in the comments blog. In this paper, the preliminary work concentrates on detecting the malicious user through the anomaly activities, behaviour profiles, messages and comment section.
      Keywords: social networks; malicious users; Naïve bayes; NLP; natural language processing; comments; social media; SVM; support vector machine
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 229 - 243
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117959
      Issue No: Vol. 2, No. 3 (2021)
       
  • iCOPS: insider attack detection in distributed file systems

    • Free pre-print version: Loading...

      Authors: Riddhi Solani, Manik Lal Das
      Pages: 244 - 255
      Abstract: Distributed file system (DFS) has been widely used in many applications. Insider attacks in DFS is a potential target that can cause problems in many applications. A malicious insider or an outsider who controls an insider could compromise application's security by exploiting the target file(s) in the system. In this paper, a scheme, named as iCOPS, is proposed to detect insider attacks in DFSs. The proposed iCOPS scheme consists of two algorithms - Process Profiling and Attack Detection. The Process Profiling runs on datanode and replica nodes that provide output to namenode, whereas, the Attack Detection runs on the namenode to detect an attack that might have triggered by the Process Profiling algorithm. The analysis and experimental results of the proposed iCOPS show notable observations in detection of data alteration by insider attacks.
      Keywords: insider attacks; system security; distributed systems; HDFS; data modification; process profiling
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 244 - 255
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117972
      Issue No: Vol. 2, No. 3 (2021)
       
  • Distributed blockchains for collaborative product designs in smart cities

    • Free pre-print version: Loading...

      Authors: Riddhi Solani, Manik Lal Das
      Pages: 256 - 274
      Abstract: Personal fabrication tools such as 3D printers encourage designers for rapidly creating innovative prototypes of products. However, an immediate end product realisation is a challenge owing to several reasons, including permission delays. This paper proposes a blockchain-enabled architecture which explores the utilisation of decentralised connected 3D printers and decision-makers for collaboratively fabricating and installing societal products in smart cities - a social computing approach. Experiments were accomplished to manifest the proposed approach; besides, a case study of printing a Taj Mahal miniature was illustrated. The proposed mechanism would reap in lots of innovations and economic improvements in smart cities in the near future.
      Keywords: blockchain; collaborative design; fabrication; distributed ledger; smart city; social good applications
      Citation: International Journal of Social Computing and Cyber-Physical Systems, Vol. 2, No. 3 (2021) pp. 256 - 274
      PubDate: 2021-10-05T23:20:50-05:00
      DOI: 10.1504/IJSCCPS.2021.117977
      Issue No: Vol. 2, No. 3 (2021)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.125.76
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-