Submission Deadline: 31 March 2026 View: 810 Submit to Special Issue
Prof. Xiangyang Luo
Email: luoxy_ieu@sina.com
Affiliation: State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450000, China; Key Laboratory of Cyberspace Situation Awareness of Henan Province, Zhengzhou, 450000, China
Research Interests: cyberspace (anti-) mapping, IP geolocation

Prof. Xiangyang Xue
Email: xyxue@fudan.edu.cn
Affiliation: School of Computer Science, Fudan University, Shanghai, 200000, China
Research Interests: big data analysis, machine learning for networks

Prof. Guopu Zhu
Email: guopu.zhu@hit.edu.cn
Affiliation: School of Cyberspace Science,Harbin Institute of Technology, Harbin, 150000, China
Research Interests: cyberspace situation awareness, Information content security

Dr. Meng Zhang
Email: zhangmeng_ieu@sina.com
Affiliation: State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, 450000, China; Key Laboratory of Cyberspace Situation Awareness of Henan Province, Zhengzhou, 450000, China
Research Interests: user attribute perception, social network analysis

Cyberspace Mapping and Anti-Mapping Technologies have emerged as core research directions in the field of cybersecurity, addressing the complexity and stealthiness of cyber threats in the digital era.
The objective of cyberspace mapping is to systematically identify the network attributes, geographical attributes, and social attributes of virtual/physical resources within target networks, alongside their interdependencies. Conversely, anti-mapping technologies focus on evading or mitigating unauthorized reconnaissance activities to safeguard critical network resources from exposure and exploitation. This special issue concentrates on theoretical advancements, technical innovations, and practical applications in cyberspace mapping and anti-mapping technologies. It covers domains such as network topology analysis, (anti-)scanning detection and identification techniques, (anti-)critical node and path analysis methods, cross-domain correlation mapping, and more. These contributions aim to provide technical support for the protection of critical infrastructure and global cyberspace governance.
The following themes are the particular interest of this special issue, including but not limited to:
- Detection and anti-detection technologies for cyberspace physical resources
- Network device geolocation and anti-geolocation methods
- Cyberspace asset identification and dynamic modelling techniques
- Cyberspace data collection and multidimensional analysis
- Perception and anti-perception strategies for social attributes of network users
- Deepfake generation and forgery authentication technologies


Submit a Paper
Propose a Special lssue