TEJAS Journal of Technologies and Humanitarian Science

ISSN : 2583-5599

Open Access | Quarterly | Peer Reviewed Journal


Cybersecurity Challenges and Risks in Social Networking Platforms


Vishal Vikram Singh
Shri Ramswaroop Memorial University, Barabanki, India 225003

Author

Bineet Kumar Gupta
Shri Ramswaroop Memorial University, Barabanki, India 225003

Author

Satya Bhushan Verma
Department of Computer Science and Engineering, University of Lucknow, Lucknow

Author


📌 DOI: https://doi.org/10.63920/ICFCSAI2025.007

🔑 Keywords: Cybersecurity, Social Network Security, Confidentiality, Integrity, Vulnerabilities.

📅 Publication Date: 02 January 2026

📜 License:

  • Share — Copy and Redistribute the material
  • Adapt — Remix, Transform, and build upon the material
  • The licensor cannot revoke these freedoms as long as you follow the license terms.

Abstract:

Artificial Intelligence (AI) is rapidly emerging as a catalyst for innovation in science education, transforming how knowledge is delivered, accessed, and applied. The integration of AI tools into teaching and learning processes has the potential to redefine educational paradigms by personalizing learning experiences, enhancing research capabilities, and fostering critical thinking and creativity among students. This paper examines the transformative role of AI in shaping the future of science education, highlighting both opportunities and challenges. AI- powered adaptive learning platforms can analyze learner behavior, identify knowledge gaps, and provide customized content that aligns with individual learning styles. Virtual laboratories and intelligent simulations allow students to experiment with complex scientific phenomena in safe, cost-effective, and scalable environments, thereby promoting experiential learning beyond traditional classrooms. Moreover, natural language processing tools and generative AI models are enabling interactive tutoring systems that provide real-time feedback, assist in problem-solving, and support collaborative learning across geographical boundaries.

Download Full PDF Paper


📖 How to Cite

Vishal Vikram Singh, Bineet Kumar Gupta, and Satya Bhushan Verma (2026). Cybersecurity Challenges and Risks in Social Networking Platforms . TEJAS J. Technol. Humanit. Sci.,, Vol. 05, Issue 01. https://doi.org/10.63920/ICFCSAI2025.007

📊 Article Metrics

👁️ Views: 12
📥 Downloads: 8

References

[1]. Y. Liu, J. Huang, Y. Li, D. Wang, B. Xiao, Generative AI model privacy: a survey, Artif. Intell. Rev. 58 (1) (2024) 33, https://doi.org/10.1007/s10462-024-11024-6.
[2]. Q. Lai, H. Hua, Secure medical image encryption scheme for Healthcare IoT using novel hyperchaotic map and DNA cubes, Expert. Syst. Appl. 264 (2025) 125854,https://doi.org/10.1016/j.eswa.2024.125854. adversarial
[3]. R. Chapaneri, S. Shah, Enhanced detection of imbalanced malicious network traffic with regularized generative networks, J. Netw. Comput. Appl. 202(2022) 103368, https://doi.org/10.1016/j.jnca.2022.103368.
[4]. Najafi, O. Varol, TurkishBERTweet: fast and reliable large language model for social media analysis, Expert. Syst. Appl. 255 (2024) 124737, https://doi.org/10.1016/j.eswa.2024.124737.
[5]. H. Wu, Q. Wu, G. Cheng, S. Guo, Instagram user behavior identification based on multidimensional features, in: IEEE INFOCOM 2020 - IEEE Conference onComputer Communications Workshops (INFOCOM WKSHPS), IEEE, 2020, pp. 1111–1116, https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162688.
[6]. T. Shapira, Y. Shavitt, FlowPic: a generic representation for encrypted traffic classification and applications identification, IEEE Trans. Netw. https://doi.org/10.1109/TNSM.2021.3071441. Serv. Manag. 18(2) (2021) 1218–1232,
[7]. [T. Bakhshi, B. Ghita, Anomaly detection in encrypted internet traffic using hybrid deep learning, Secur. Commun. Netw. 2021 (2021) 1–16, https://doi.org/10.1155/2021/5363750.
[8]. H.-Y. Chen, T.-N. Lin, The challenge of only one flow problem for traffic classification in identity obfuscation environments, IEEE https://doi.org/10.1109/ACCESS.2021.3087528. Access. 9 (2021)84110–84121,
[9]. G. Mengmeng, Y. Xiangzhan, V.Mysore Sachidananda, L. Shangqing, L. Likun, ENiD: an encrypted web pages traffic identification based on web visiting behavior, in: 2022 IEEE International Conference on Data Mining Workshops (ICDMW), https://doi.org/10.1109/ICDMW58026.2022.00082.
[10]. IEEE, 2022, pp. 593–601, Z. Wang, B. Ma, Y. Zeng, X. Lin, K. Shi, Z. Wang, Differential preserving in XGBoost model for encrypted traffic classification, in: 2022 International Conference on Networking and Network Applications (NaNA), IEEE, 2022, pp. 220–225, https://doi.org/10.1109/NaNA56854.2022.00044.
[11]. H. Kour, M.K. Gupta, An hybrid deep learning approach for depression prediction from user tweets using feature-rich CNN and bi-directional LSTM, Multimed. Tools. Appl. 81 (17) (2022) 23649–23685, https://doi.org/10.1007/s11042-022-12648-y.
[12]. T. Wu, et al., BehavSniffer: sniff user behaviors from the encrypted traffic by traffic burst graphs, in: 2023 20th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE, 2023, pp. 456–464, https://doi.org/10.1109/SECON58729.2023.10287511.
[13]. L. Wang, Z. Cheng, Q. Lv, Y. Wang, S. Zhang, W. Huang, ACG: attack classification on encrypted network traffic using graph Convolution attention Networks, in: 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), IEEE, 2023, pp. 47–52, https://doi.org/10.1109/CSCWD57460.2023.10152599.