New Challenges in Information Security and Privacy and Cyber Resilience

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 September 2024 | Viewed by 1021

Special Issue Editors


E-Mail
Guest Editor
Institute of Computer Science, Foundation for Research and Technology–Hellas (FORTH), Vassilika Vouton, 70013 Heraklion, Greece
Interests: information systems security and privacy; risk assessment; digital forensics and cyber threat intelligence; security training and cyber-ranges; and disaster mitigation planning in critical infrastructures
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Electrical and Computer Engineering, Technical University of Crete, Akrotiri Campus, 731 00 Chania, Greece
Interests: systems and network security; security policy; privacy; high-speed networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Informatics, University of Oslo, Gaustadalléen 23B, 0373 Oslo, Norway
Interests: cyber (threat) intelligence representation, sharing, and reasoning; information modeling; systems interoperability and standardization; security orchestration and automation; threat management; artificial intelligence

E-Mail Website
Guest Editor
Faculty of Science and Technology, Bournemouth University, Bournemouth BH12 5BB, UK
Interests: AI in cybersecurity; cryptography; cyberdefence exercises; information warfare and security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue, 'New Challenges in Information Security, Privacy, and Cyber Resilience', will address the evolving landscape of digital threats and the need for innovative strategies to safeguard sensitive information, uphold privacy, and fortify organizational resilience in the face of cyber incidents.

In an era marked by rapid technological advancement, the proliferation of interconnected devices, and the widespread adoption of cloud computing, digital ecosystems have become increasingly vulnerable. This Special Issue delves into emerging threats such as sophisticated cyber-attacks, ransomware, data breaches, supply chain security, and social engineering techniques, providing a platform for experts, researchers, and practitioners to explore novel approaches to data security.

The Special Issue emphasizes the intricate interplay between information security, privacy, and cyber resilience and highlights the pressing need for holistic frameworks that not only fortify digital fortifications, but also uphold the privacy rights of individuals and organizations. We are seeking cutting-edge research on encryption protocols, authentication mechanisms, and access control systems that strike a balance between security and privacy.

This Special Issue will also focus on cyber resilience—the capacity to anticipate, prepare for, respond to, and recover from cyber incidents—covering topics such as incident response planning, threat intelligence sharing, and the role of human factors in bolstering cyber resilience.

The Special Issue seeks to bridge the gap between theoretical advancements and real-world applications, fostering a collaborative environment between academia and industry. It aims to equip cybersecurity professionals with the knowledge and tools necessary to stay ahead of evolving threats, ensuring the continued integrity, confidentiality, and availability of critical information.

The research published in this Special Issue will provide definitive resource for scholars, practitioners, and policymakers working towards a safer and more secure digital future.

Topics of interest include, but are not limited to:

  • Cybersecurity in modern computerized ecosystems (e.g., Internet of Things (IoT), cyber-physical systems (CPS), supply chains, smart cities and intelligent environments, etc.);
  • Privacy preservation and data protection in the digital era;
  • Cyber resilience of critical infrastructures;
  • Artificial intelligence in cyber protection;
  • Cyber threat intelligence and information sharing among collaborating organizations and communities;
  • Incident response planning and playbooks;
  • Secure development lifecycle for software and hardware;
  • Opensource software/hardware guarantees and bill of materials (BOM);
  • Security validation and theoretic aspects of security;
  • Cyber ranges training, raising awareness, and ethical aspects.

Dr. George Hatzivasilis
Prof. Dr. Sotiris Ioannidis
Dr. Vasileios Mavroeidis
Prof. Dr. Vasilis Katos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity in modern computerized ecosystems 
  • privacy preservation and data protection in the digital era
  • cyber resilience of critical infrastructures

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 3321 KiB  
Article
Design and Implementation of a UMLRPAsec-Extension for Robotic Process Automation
by Anastasiya Kurylets and Nikolaj Goranin
Electronics 2024, 13(4), 769; https://doi.org/10.3390/electronics13040769 - 15 Feb 2024
Viewed by 601
Abstract
Ensuring RPA (robotic process automation) security is a critical aspect when developing and operating automated software robots. One of the key steps for developing secure software robots is the design stage: the identification and specification of the requirements for the security of the [...] Read more.
Ensuring RPA (robotic process automation) security is a critical aspect when developing and operating automated software robots. One of the key steps for developing secure software robots is the design stage: the identification and specification of the requirements for the security of the system, the description of system precedents, the interaction between the classes involved in the robot being created, etc. Designs using security-oriented formal modeling languages, such as the UMLsec extension of UML, involve not only a visual representation of diagrams but also the possibility to focus the attention on security issues. However, currently, in the scientific community, there is no possibility of using stereotypes specialized for robots—a mechanism for expanding the unified modeling language that would explicitly reflect a specific problem in the subject area. In this article, we propose that the UMLRPAsec-extension for RPA can be used to model security in the RPA context. Full article
Show Figures

Figure 1

Back to TopTop