Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing Cyberspace against Cyberbullying: A Wireless Network Security Perspective


Affiliations
1 Department of Computer Science and Engineering, Soban Singh Jeena University, India
2 Department of Computer Science, Soban Singh Jeena University, India
3 Department of Computer Science and Engineering, SCMS School of Engineering and Technology, India
4 Department of Business Administration, Swiss School of Management, Switzerland
     

   Subscribe/Renew Journal


Cyberbullying has emerged as a pervasive issue in today's digitally connected society, with detrimental effects on individuals’ mental health and well-being. Despite increasing awareness and efforts to address cyberbullying, there remains a significant gap in utilizing wireless network security measures as a means of mitigation. The existing literature predominantly focuses on social and psychological aspects of cyberbullying, overlooking the potential role of wireless network security in prevention and intervention strategies. This research seeks to fill this gap by exploring the effectiveness of leveraging wireless network security to secure cyberspace against cyberbullying incidents. The research employs a multifaceted methodology, beginning with the estimation of expected rates and derivative risks of cyberbullying within wireless networks. These metrics are combined into a risk index value, which serves as a basis for prioritizing mitigation efforts. Additionally, the study explores the application of cyberspace modeling techniques, specifically Support Vector Machines (SVM), to enhance screening processes and identify potential cyberbullying incidents on Wireless Network Security (WNS). The findings of this research demonstrate the efficacy of integrating wireless network security measures into cyberbullying prevention strategies. By combining risk index values and leveraging SVM-based cyberspace modeling, the study identifies and prioritizes cyberbullying risks effectively. Furthermore, the implementation of wireless network security protocols contributes to a reduction in cyberbullying incidents, fostering safer digital environments for users.

Keywords

Cyberbullying, Wireless Network Security, Risk Assessment, Support Vector Machines (SVM), Prevention Strategies.
Subscription Login to verify subscription
User
Notifications
Font Size

  • C.T. Lin, S.L. Wu and M.L. Lee, “Cyber Attack and Defense on Industry Control Systems”, Proceedings of IEEE International Conference on Dependable and Secure Computing, pp. 1-3, 2017.
  • A. Jain, T. Singh and S. Kumar Sharma, “Security as a Solution: An Intrusion Detection System using a Neural Network for IoT Enabled Healthcare Ecosystem”, Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 16, pp. 331-369, 2021.
  • P. Kumar, G.P. Gupta and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks”, Computer Communications, Vol. 166, pp. 110-124, 2021.
  • J. Singh, J. Deepika, J. Sathyendra Bhat and S. Sakthivel, “Energy-Efficient Clustering and Routing Algorithm using Hybrid Fuzzy with Grey Wolf Optimization in Wireless Sensor Networks”, Security and Communication Networks, Vol. 2022, pp. 1-13, 2022.
  • J. Hussain and V. Hnamte, “Deep Learning based Intrusion Detection System: Software Defined Network”, Proceedings of Asian Conference on Innovation in Technology, pp. 1-6, 2021.
  • L. Zhong and B. Ren, “Slice Allocation of 5G Network for Smart Grid with Deep Reinforcement Learning ACKTR”, Proceedings of International Conference on Intelligent Computing and Signal Processing, pp. 242-249, 2022.
  • M.L. Das, “Two-Factor User Authentication in Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
  • D David Neels Pon Kumar, K Murugesan and S Raghavan, “A Novel QoS Scheduling for Wireless Broadband Networks”, ICTACT Journal on Communication Technology, Vol. 1, No. 3, pp 143-148, 2010.
  • H.A. Ahmed and H.A.A. AL-Asadi, “An Optimized Link State Routing Protocol with a Blockchain Framework for Efficient Video-Packet Transmission and Security over Mobile Ad-Hoc Networks”, Journal of Sensor and Actuator Networks, Vol. 13, No. 2, pp. 22-28, 2024.
  • A. Orelaja and O. Akinola, “Attribute-Specific Cyberbullying Detection using Artificial Intelligence”, Journal of Electronic and Information Systems, Vol. 6, No. 1, pp. 10-21, 2024.
  • E.M. Campos, “Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 1-13, 2021.
  • X. Liang, “The Cause and Influence of Cyberbullying”, Journal of Education, Humanities and Social Sciences, Vol. 26, pp. 661-668, 2024.

Abstract Views: 108

PDF Views: 0




  • Securing Cyberspace against Cyberbullying: A Wireless Network Security Perspective

Abstract Views: 108  |  PDF Views: 0

Authors

Neerav Nishant
Department of Computer Science and Engineering, Soban Singh Jeena University, India
Parul Saxena
Department of Computer Science, Soban Singh Jeena University, India
S.G. Surya
Department of Computer Science and Engineering, SCMS School of Engineering and Technology, India
Ullal Akshatha Nayak
Department of Computer Science and Engineering, Soban Singh Jeena University, India
Subharun Pal
Department of Business Administration, Swiss School of Management, Switzerland

Abstract


Cyberbullying has emerged as a pervasive issue in today's digitally connected society, with detrimental effects on individuals’ mental health and well-being. Despite increasing awareness and efforts to address cyberbullying, there remains a significant gap in utilizing wireless network security measures as a means of mitigation. The existing literature predominantly focuses on social and psychological aspects of cyberbullying, overlooking the potential role of wireless network security in prevention and intervention strategies. This research seeks to fill this gap by exploring the effectiveness of leveraging wireless network security to secure cyberspace against cyberbullying incidents. The research employs a multifaceted methodology, beginning with the estimation of expected rates and derivative risks of cyberbullying within wireless networks. These metrics are combined into a risk index value, which serves as a basis for prioritizing mitigation efforts. Additionally, the study explores the application of cyberspace modeling techniques, specifically Support Vector Machines (SVM), to enhance screening processes and identify potential cyberbullying incidents on Wireless Network Security (WNS). The findings of this research demonstrate the efficacy of integrating wireless network security measures into cyberbullying prevention strategies. By combining risk index values and leveraging SVM-based cyberspace modeling, the study identifies and prioritizes cyberbullying risks effectively. Furthermore, the implementation of wireless network security protocols contributes to a reduction in cyberbullying incidents, fostering safer digital environments for users.

Keywords


Cyberbullying, Wireless Network Security, Risk Assessment, Support Vector Machines (SVM), Prevention Strategies.

References