Advanced Cybersecurity Applications: Solutions to Counteract Cyber Threats

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 November 2024 | Viewed by 876

Special Issue Editors

Special Issue Information

Dear Colleagues,

This Special Issue is dedicated to developments in cyber security from an interdisciplinary and multidisciplinary perspective, and focuses on the current and evolving challenges that are changing the landscape of threat. Establishing how  organizations,  governments and society can be better protected and withstand current and evolving cyber-attacks is of particular interest, in addition to intra-organizational and inter-organizational arrangements and how technology and human–technology interaction can enhance cyber security from a holistic perspective; this would benefit society and ensure that appropriate countermeasures are in place. We welcome a range of contributions and encourage researchers to submit their papers to this Special Issue for consideration. Indeed, we are eager to include empirical papers, practitioner-oriented papers, theoretical papers, review-oriented papers and conceptual papers, with an emphasis on linking theory with practice, and extending our knowledge of cyber security.

The areas to be addressed include:

Trustworthiness, software; cloud computing; vulnerabilities and solutions regarding artificial intelligence; the use of advanced biometrics; issues in blockchain technology; improving cyber security systems and networks; cyber security models; management policies and new business models; organizational relationships; governance and compliance; strategic intelligence; ethical hacking; the protection of critical national infrastructure and the protection of critical information infrastructure; smart cities; the consumer and privacy; counteracting fake news and disinformation; social media networks; online advertising; the Internet of Things; educational policy; the psychology of cyber-crime; ransomware; government policy; and digitalization.

Contributions to this Special Issue may draw upon a range of related bodies of knowledge, including business continuity management, crisis and emergency management, organizational resilience, and risk management. In addition, this Special Issue will be open to a range of authors, including scientists and social scientists.

Dr. Peter R. J. Trim
Dr. Yang-Im Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artificial intelligence
  • computer networks
  • critical infrastructure
  • cyber security knowledge
  • education
  • frameworks
  • models
  • processes
  • the learning organization
  • security frameworks
  • social media networks
  • strategic intelligence
  • strategic threat detection
  • systems

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

22 pages, 1650 KiB  
Article
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
by Shenjian Qiu, Zhipeng Shao, Jian Wang, Shiyou Xu and Jiaxuan Fei
Appl. Sci. 2024, 14(14), 6189; https://doi.org/10.3390/app14146189 (registering DOI) - 16 Jul 2024
Abstract
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the [...] Read more.
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cross-space and strong coupling characteristics of the power cyber-physical system business and the vertical architecture of network security protection focusing on border protection. The attack graph included cyber-physical cross-domain attacks, control master stations, measurement and control equipment failures, transient stable node disturbances, and other vertices, and achieved a comprehensive depiction of the attack path. Second, the out-degree, in-degree, vertex betweenness, etc.,, of each vertex in the attack graph were comprehensively considered to calculate the vertex vulnerability, and by defining the cyber-physical coupling degree and edge weights, the risk of each attack path was analyzed in detail. Finally, the IEEE RTS79 and RTS96 node systems were selected, and the impact of risk conduction on the cascading failures of the physical space system under typical attack paths was analyzed using examples, verifying the effectiveness of the proposed method. Full article

Review

Jump to: Research

33 pages, 17872 KiB  
Review
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
by Sk Tahsin Hossain, Tan Yigitcanlar, Kien Nguyen and Yue Xu
Appl. Sci. 2024, 14(13), 5501; https://doi.org/10.3390/app14135501 - 25 Jun 2024
Viewed by 476
Abstract
Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while maintaining data integrity and public trust. These responsibilities become even more critical as they transition into smart cities adopting advanced technological [...] Read more.
Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while maintaining data integrity and public trust. These responsibilities become even more critical as they transition into smart cities adopting advanced technological innovations to revolutionize governance, enhance service delivery, and foster sustainable and resilient urban environments. Technological advancements like Internet-of-Things devices and artificial intelligence-driven approaches can provide better services to residents, but they also expose local governments to cyberthreats. There has been, nonetheless, very little study on cybersecurity issues from the local government perspective, and information on the multifaceted nature of cybersecurity in local government settings is scattered and fragmented, highlighting the need for a conceptual understanding and adequate action. Against this backdrop, this study aims to identify key components of cybersecurity in a local governmental context through a systematic literature review. This review further extends to the development of a conceptual framework providing a comprehensive understanding of the local government’s cybersecurity landscape. This study makes a significant contribution to the academic and professional domains of cybersecurity issues and policies within the local governmental context, offering valuable insights to local decision-makers, practitioners, and academics. This study also helps identify vulnerabilities, enabling stakeholders to recognize shortcomings in their cybersecurity and implement effective countermeasures to safeguard confidential information and documents. Thus, the findings inform local government policy to become more cybersecurity-aware and prepared. Full article
Show Figures

Figure 1

Back to TopTop