Cybersecurity, Cybercrimes, and Smart Emerging Technologies

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 1472

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Computers and Information, Menoufia University‬, Shebin El-Koom 32511, Egypt
Interests: biometrics; pattern recognition; deep learning; machine learning; AI
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt
Interests: quantum information processing; information security; cybersecurity; information hiding; biometrics; internet of things (IoT); big data; blockchain; forensic analysis in digital images
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electronics and Communications Engineering, Zagazig University, Zagazig 44519, Egypt
Interests: 5G wireless communications; tactile internet; vehicular networks; SDN; MEC
Special Issues, Collections and Topics in MDPI journals

E-Mail
Guest Editor
EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Interests: cybersecurity; artificial intelligence; deep learning; complexity science; data science; natural language processing

Special Issue Information

Dear Colleagues,

This Special Issue will present extended versions of selected papers presented at the Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET2023). The objectives of CCSET 2023 are to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions, and presentations on the most recent cybersecurity, cybercrime, and emerging technologies challenges and developments from the perspective of providing real-world security awareness. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas across all levels of the scientific community and to provide opportunities to develop creative solutions for various cybersecurity and smart emerging technologies problems. Authors of invited papers should be aware that the final submitted manuscript must provide a minimum of 50% new content and not exceed 30% copy/paste from the proceedings paper. In addition, authors outside the conference are also welcome to submit their papers within the scope of the issue.

Topics:

  • Cybersecurity and cybercrime
  • Smart emerging technologies
  • Social cybersecurity with NLP and deep machine learning
  • Blockchain for cybersecurity
  • Web application security
  • 5G/6G edge/fog computing-enabled Internet of Things
  • Cloud computing and applications
  • Artificial intelligence for smart emerging technologies 
  • Security in medical imaging
  • Biometric security
  • Fake profiles, Honey accounts and unlawful accounts on social media
  • Advances in deep machine learning for cybersecurity

Dr. Mohamed Hammad
Dr. Ahmed A. Abd El-Latif
Dr. Abdelhamied Ashraf Ateya
Prof. Dr. Mohammed ElAffendi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 1456 KiB  
Article
Insights into Cybercrime Detection and Response: A Review of Time Factor
by Hamed Taherdoost
Information 2024, 15(5), 273; https://doi.org/10.3390/info15050273 - 12 May 2024
Viewed by 571
Abstract
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and individuals. Nevertheless, the swift process of digitization has concurrently led to the emergence of cybercrime, which [...] Read more.
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and individuals. Nevertheless, the swift process of digitization has concurrently led to the emergence of cybercrime, which takes advantage of weaknesses in interconnected systems. The growing dependence of society on digital communication, commerce, and information sharing has led to the exploitation of these platforms by malicious actors for hacking, identity theft, ransomware, and phishing attacks. With the growing dependence of organizations, businesses, and individuals on digital platforms for information exchange, commerce, and communication, malicious actors have identified the susceptibilities present in these systems and have begun to exploit them. This study examines 28 research papers focusing on intrusion detection systems (IDS), and phishing detection in particular, and how quickly responses and detections in cybersecurity may be made. We investigate various approaches and quantitative measurements to comprehend the link between reaction time and detection time and emphasize the necessity of minimizing both for improved cybersecurity. The research focuses on reducing detection and reaction times, especially for phishing attempts, to improve cybersecurity. In smart grids and automobile control networks, faster attack detection is important, and machine learning can help. It also stresses the necessity to improve protocols to address increasing cyber risks while maintaining scalability, interoperability, and resilience. Although machine-learning-based techniques have the potential for detection precision and reaction speed, obstacles still need to be addressed to attain real-time capabilities and adjust to constantly changing threats. To create effective defensive mechanisms against cyberattacks, future research topics include investigating innovative methodologies, integrating real-time threat intelligence, and encouraging collaboration. Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
Show Figures

Figure 1

Back to TopTop