Advanced Cybersecurity Applications: Solutions to Counteract Cyber Threats

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 November 2024 | Viewed by 32

Special Issue Editors

Special Issue Information

Dear Colleagues,

This Special Issue is dedicated to developments in cyber security from an interdisciplinary and multidisciplinary perspective, and focuses on the current and evolving challenges that are changing the landscape of threat. Establishing how  organizations,  governments and society can be better protected and withstand current and evolving cyber-attacks is of particular interest, in addition to intra-organizational and inter-organizational arrangements and how technology and human–technology interaction can enhance cyber security from a holistic perspective; this would benefit society and ensure that appropriate countermeasures are in place. We welcome a range of contributions and encourage researchers to submit their papers to this Special Issue for consideration. Indeed, we are eager to include empirical papers, practitioner-oriented papers, theoretical papers, review-oriented papers and conceptual papers, with an emphasis on linking theory with practice, and extending our knowledge of cyber security.

The areas to be addressed include:

Trustworthiness, software; cloud computing; vulnerabilities and solutions regarding artificial intelligence; the use of advanced biometrics; issues in blockchain technology; improving cyber security systems and networks; cyber security models; management policies and new business models; organizational relationships; governance and compliance; strategic intelligence; ethical hacking; the protection of critical national infrastructure and the protection of critical information infrastructure; smart cities; the consumer and privacy; counteracting fake news and disinformation; social media networks; online advertising; the Internet of Things; educational policy; the psychology of cyber-crime; ransomware; government policy; and digitalization.

Contributions to this Special Issue may draw upon a range of related bodies of knowledge, including business continuity management, crisis and emergency management, organizational resilience, and risk management. In addition, this Special Issue will be open to a range of authors, including scientists and social scientists.

Dr. Peter R. J. Trim
Dr. Yang-Im Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artificial intelligence
  • computer networks
  • critical infrastructure
  • cyber security knowledge
  • education
  • frameworks
  • models
  • processes
  • the learning organization
  • security frameworks
  • social media networks
  • strategic intelligence
  • strategic threat detection
  • systems

Published Papers

This special issue is now open for submission.
Back to TopTop