New Trends for Network Security Based on Mobile Computing

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 September 2024 | Viewed by 115

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, Edinburgh Napier University, Edinburgh EH14 1DJ, UK
Interests: cyber security; cloud computing; network security; intrusion detection; quantum machine learning; adversarial behaviors; identity

E-Mail Website
Guest Editor
School of Computing, Teesside University, Middlesbrough TS1 3BX, UK
Interests: cybersecurity; Industry 4.0; Internet of Things (IoT) Social Internet of Things (SIoT); Cyber Physical Systems (CPS); explainable AI and deep learning; semantic web; probabilistic ontology; stream processing; big data
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue aims to bring researchers and practitioners from across different network security and mobile computing communities together in a distinctive medium to present and exchange ideas, results, and experiences. It focuses on the latest advancements and research in network security, particularly in the context of mobile computing. This Issue aims to build a community of authors and readers in order to discuss and present the latest trends and developments. It will emphasize the importance of addressing security challenges in the rapidly evolving landscape of mobile computing and network technologies. In particular, we will address various aspects of network security, including IoT security, wireless security, mobile applications security, and other related topics. Aligning closely with the subject areas of computer science and networks within the Electronics journal, this Special Issue will highlight the significance of addressing security challenges in the rapidly evolving landscape of mobile computing and network technologies.

In this Special Issue, original research articles and reviews are welcome. Research areas may include (but are not limited to) the following:

  • Improved authentication
  • Wireless security
  • Firewalls and honeypots
  • Endpoint security
  • Biometrics in security
  • Malware detection
  • Information security
  • Cloud security
  • Ransomware
  • Digital forensics
  • Challenges in remote access
  • Data storage security
  • Data loss prevention systems
  • Social media security
  • Cryptography
  • Blockchains
  • Mobile applications security

Dr. Mouad Lemoudden
Dr. Zia Ush Shamszaman
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • mobile security
  • network security
  • cyber threats
  • mobile computing

Published Papers

This special issue is now open for submission.
Back to TopTop