Multimedia Data and Network Security

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "ICT Infrastructures for Cybersecurity".

Deadline for manuscript submissions: 31 October 2025 | Viewed by 2065

Special Issue Editor


E-Mail Website
Guest Editor
Department of Network and Computer Security, State University of New York Polytechnic Institute, C135, Kunsela Hall, Utica, NY 13502, USA
Interests: machine learning and computer vision with applications to cybersecurity; biometrics; deepfakes; affect recognition; image and video processing; perceptual-based audiovisual multimedia quality assessment

Special Issue Information

Dear Colleagues,

In the digital era, multimedia data have become integral to our daily lives, permeating various platforms and networks. The multimedia data proliferation coupled with the increasing complexity of network infrastructures has brought unprecedented challenges and opportunities in the realm of security and integrity of such data and networks. This Special Issue aims to explore the pressing challenges and innovations in protecting multimedia data and the networks through which it is transmitted. This Special Issue seeks high-quality, original research contributions that present cutting-edge methodologies, frameworks, and technologies designed to enhance multimedia data security. By bringing together researchers, academicians, and practitioners, this Special Issue aspires to foster the dissemination of the latest findings, stimulate innovative ideas, and shape future research directions in the field of multimedia data and network security. We welcome your valuable contributions to this crucial discourse.

Dr. Zahid Akhtar
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • multimedia security
  • network security
  • data encryption
  • digital watermarking
  • steganography
  • content protection
  • cryptography
  • secure multimedia communication
  • secure multimedia streaming
  • multimedia forensics
  • network intrusion detection
  • secure data transmission
  • multimedia authentication
  • secure multimedia storage
  • multimedia privacy
  • new transmission protocols
  • blockchain technology
  • privacy preserving multimedia processing
  • deep fake detection and mitigation
  • secure communication in wireless and mobile networks
  • threat modeling and risk assessment
  • security in IoT and smart networks
  • cross-layer security mechanisms for multimedia and network integration
  • AI and machine learning applications in multimedia and network security
  • case studies and real-world applications of integrated security solutions

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 1542 KiB  
Article
Mitigation of Risks Associated with Distrustful Routers in OSPF Networks—An Enhanced Method
by Kvitoslava Obelovska, Yaromyr Snaichuk, Oleh Liskevych, Stergios-Aristoteles Mitoulis and Rostyslav Liskevych
Computers 2025, 14(2), 43; https://doi.org/10.3390/computers14020043 - 29 Jan 2025
Viewed by 311
Abstract
Packet routing in computer networks provides complex challenges in environments with distrustful routers due to security vulnerabilities or potential malicious behaviors. The literature offers solutions to the problem designed for different types of networks. This paper introduces a novel method to mitigate risks [...] Read more.
Packet routing in computer networks provides complex challenges in environments with distrustful routers due to security vulnerabilities or potential malicious behaviors. The literature offers solutions to the problem designed for different types of networks. This paper introduces a novel method to mitigate risks associated with distrustful routers by constructing secure and efficient routing paths in Open Shortest Path First (OSPF) networks. Networks in which routing is carried out based on OSPF protocols are currently the most widespread, hence ensuring the security of data transmission in such networks is urgently needed. In turn, distrustful routers can degrade the overall security and performance of the network, creating vulnerabilities that can be used for malicious purposes. The proposed method is based on the Dijkstra algorithm which is enhanced to identify and mitigate the risk connected with potential distrustful network nodes. Analysis of the proposed method shows its ability to build efficient routes exclusively through trusted routers if such paths exist. As a criterion for effectiveness, a metric such as the channel weight is used. The proposed method is validated using applications across networks of varying topologies and sizes, including large-scale networks. For networks containing post-distrustful routers to which there is no path without distrustful nodes, the proposed method is able to build the shortest paths that are marked as not secure but have a minimum number of distrustful nodes on their path. In scenarios with multiple compromised routers with different locations in the network, the proposed method significantly increases network resilience. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
25 pages, 1993 KiB  
Article
Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them
by Abdullah Alabdulatif and Navod Neranjan Thilakarathne
Computers 2025, 14(1), 24; https://doi.org/10.3390/computers14010024 - 15 Jan 2025
Viewed by 688
Abstract
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed [...] Read more.
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used tools at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access to exposed systems, devices, and sensitive data on the World Wide Web. While these tools can be leveraged by professional hackers, they have also empowered “Script Kiddies”, who are low-skill, inexperienced attackers who use readily available exploits and scanning tools without deep technical knowledge. Consequently, cyberattacks targeting critical infrastructure are growing at a rapid rate, driven by the ease with which these solutions can be operated with minimal expertise. This paper explores the potential for cyberattacks enabled by these tools, presenting use cases where these platforms have been used for both offensive and defensive purposes. By examining notable incidents and analyzing potential threats, we outline proactive measures to protect against these emerging risks. In this study, we delve into how these tools have been used offensively by attackers and how they serve defensive functions within cybersecurity. Additionally, we also introduce an automated all-in-one tool designed to consolidate the functionalities of Google dorks, Shodan, and Censys, offering a streamlined solution for vulnerability detection and analysis. Lastly, we propose proactive defense strategies to mitigate exploitation risks associated with such tools, aiming to enhance the resilience of critical digital infrastructure against evolving cyber threats. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Figure 1

18 pages, 1079 KiB  
Article
A Threefold Approach for Enhancing Fuzzy Interpolative Reasoning: Case Study on Phishing Attack Detection Using Sparse Rule Bases
by Mohammad Almseidin, Maen Alzubi, Jamil Al-Sawwa, Mouhammd Alkasassbeh and Mohammad Alfraheed
Computers 2024, 13(11), 291; https://doi.org/10.3390/computers13110291 - 8 Nov 2024
Viewed by 679
Abstract
Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because [...] Read more.
Fuzzy systems are powerful modeling systems for uncertainty applications. In contrast to traditional crisp systems, fuzzy systems offer the opportunity to extend the binary decision to continuous space, which could offer benefits for various application areas such as intrusion detection systems (IDSs), because of their ability to measure the degree of attacks instead of making a binary decision. Furthermore, fuzzy systems offer a suitable environment that is able to deal with uncertainty. However, fuzzy systems face a critical challenge represented by the sparse fuzzy rules. Typical fuzzy systems demand complete fuzzy rules in order to offer the required results. Additionally, generating complete fuzzy rules can be difficult due to many factors, such as a lack of knowledge base or limited data availability, such as in IDS applications. Fuzzy rule interpolation (FRI) was introduced to overcome this limitation by generating the required interpolation results in cases with sparse fuzzy rules. This work introduces a threefold approach designed to address the cases of missing fuzzy rules, which uses a few fuzzy rules to handle the limitations of missing fuzzy rules. This is achieved by finding the interpolation condition of neighboring fuzzy rules. This procedure was accomplished based on the concept of factors (which determine the degree to which each neighboring fuzzy rule contributes to the interpolated results, in cases of missing fuzzy rules). The evaluation procedure for the threefold approach was conducted using the following two steps: firstly, using the FRI benchmark numerical metrics, the results demonstrated the ability of the threefold approach to generate the required results for the various benchmark scenarios. Secondly, using a real-life dataset (phishing attacks dataset), the results demonstrated the effectiveness of the suggested approach to handle cases of missing fuzzy rules in the area of phishing attacks. Consequently, the suggested threefold approach offers an opportunity to reduce the number of fuzzy rules effectively and generate the required results using only a few fuzzy rules. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Figure 1

Back to TopTop