Special Issues

Journal of Cybersecurity and Privacy publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic and all Special Issue submissions follow MDPI's standard editorial process. The journal’s Editor-in-Chief and/or designated Editorial Board Member will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. Further information on MDPI's Special Issue policies and Guest Editor responsibilities can be found here. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
Multimedia Security and Privacy
edited by
submission deadline 10 Oct 2025 | 3 articles | Viewed by 20390 | Submission Open
(This special issue belongs to the Section Security Engineering & Applications)
Advanced Technologies for Detecting Cybersecurity Attacks in Internet of Things Systems submission deadline 20 Oct 2025 | Viewed by 382 | Submission Open
Keywords: IoT security; cybersecurity attacks; anomaly detection; intrusion detection; machine learning; AI-driven security; blockchain; edge computing; threat monitoring; data fusion; privacy-preserving techniques
(This special issue belongs to the Section Security Engineering & Applications)
Cyber Security and Digital Forensics—2nd Edition submission deadline 31 Oct 2025 | 9 articles | Viewed by 20595 | Submission Open
Keywords: information security; cybersecurity auditing; cybersecurity and information security compliance; cybersecurity governance and regulations; cyber situational awareness; digital forensics for cybersecurity; digital forensics incident response; digital forensics automation
(This special issue belongs to the Section Security Engineering & Applications)
Data Protection and Privacy
edited by , and Kyriakos Stefanidis
submission deadline 20 Nov 2025 | 9 articles | Viewed by 42257 | Submission Open
Keywords: cybersecurity and privacy in industrial environments; security in cyber– physical environments; cryptography in I4.0; security and privacy in industrial control systems; IoT security and privacy; IoT system and network security; privacy protection and privacy-by-design; blockchains and smart contracts for IoT; trust issues in intelligent IoT devices; IoT threat detection and risk management; incident response and vulnerability management in IoT infrastructures; IoT privacy protection; secure data management and trading in industrial environments; privacy-enhancing technologies for Ι ο Τ devices; IoT Identity management; artificial intelligence (AI)-based security; machine learning and data protection for I4.0; standardization activities for I4.0 security; quantum and post-quantum I4.0 cryptography; IoT side-channel attacks
(This special issue belongs to the Section Privacy)
Building Community of Good Practice in Cybersecurity
edited by , Hanan Hindy and Aunshul Rege
submission deadline 31 Dec 2025 | 4 articles | Viewed by 36148 | Submission Open
Keywords: cyber situational awareness; security in artificial intelligence and robotics; human factor cognition and security; security in blockchain technologies; STEM and cyber security education; social media; wearable; and web analytics security; cyber security; application container platform security; cyber incident response
(This special issue belongs to the Section Security Engineering & Applications)
Cloud Security and Privacy submission deadline 30 Jan 2026 | 4 articles | Viewed by 30046 | Submission Open
(This special issue belongs to the Section Privacy)
Applied Cryptography
edited by Yangguang Tian and
submission deadline 20 Feb 2026 | 1 articles | Viewed by 1070 | Submission Open
Keywords: cryptography and cryptanalysis; applied cryptography; cryptography for iot and blockchains; cryptography for secure computing; cryptography for data protection; privacy-preserving technologies
(This special issue belongs to the Section Cryptography and Cryptology)
Intrusion/Malware Detection and Prevention in Networks—2nd Edition
edited by and
submission deadline 10 Mar 2026 | 4 articles | Viewed by 4177 | Submission Open
Keywords: distributed denial-of-service (DDoS) attack and defense; explainable prevention strategies; profiling normal or abnormal system behaviors; metrics for evaluating the effectiveness of intrusion detection techniques; access control; biometrics; jamming attack and defense; trojan attack and defense; viruses and malware; covert channel detection; malware and unwanted software
(This special issue belongs to the Section Security Engineering & Applications)
Security of Smart Grid: From Cryptography to Artificial Intelligence
edited by
submission deadline 30 Jun 2026 | Viewed by 41 | Submission Open
Keywords: cryptography for smart grids; post-quantum cryptography for smart grids; AI for smart grid security; deep learning for smart grid security; distributed energy resource (DER) security; transformer security; large language models (LLMs) for smart grid security; intrusion detection and anomaly detection in smart grid networks; secure communication protocols for smart grids (SCADA; IEC 61850; DNP3; etc.); blockchain and distributed ledger technologies for smart grid security; zero-trust architectures for smart grid infrastructures; lightweight cryptography for constrained smart grid devices; hybrid classical– post-quantum cryptographic protocols in grid communications; hardware security modules (HSMs) and secure key management in smart grid environments; federated learning for smart grid security and privacy preservation; adversarial machine learning and robustness in smart grid AI models; reinforcement learning for attack detection and response in grid operations; graph neural networks (GNNs) for power grid anomaly detection; security of demand response management and advanced metering infrastructure (AMI); edge and fog computing security for distributed smart grid applications; cloud and data center security in smart grid ecosystems; cyber– physical attack detection; modeling; and mitigation in smart grid systems; quantum machine learning for smart grid intrusion detection and forecasting; digital twins and simulation frameworks for testing smart grid cyber resilience; privacy-preserving data analytics for energy consumption data; regulatory and compliance frameworks for smart grid cybersecurity; NIST/ISO/IEC standardization and adoption for smart grid systems; risk assessment; threat modeling; and incident response in smart grids; economic and societal impacts of cyber attacks on smart grids
(This special issue belongs to the Section Security Engineering & Applications)
Back to TopTop