Symmetry and Asymmetry in Intelligent Detection Mechanisms for Modern Security Systems

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: 31 July 2026 | Viewed by 113

Special Issue Editors


E-Mail Website
Guest Editor
Department of Informatics, Faculty of Engineering, Built Environment and Information Technology, University of Pretoria, Pretoria 0028, South Africa
Interests: machine learning innovations in intrusion detection systems; ransomware threats and detection mechanisms; forensic insights into internet of things devices; distributed methods for big data regression; semantic integration of building data models; security frameworks for industrial control systems; sentiment classification in social networking data; traffic classification and network security innovations; software architecture and decision-making frameworks

E-Mail Website
Guest Editor
Department of Informatics, Faculty of Engineering, Built Environment and Information Technology, University of Pretoria, Pretoria 0028, South Africa
Interests: enhancing IPTV services through user-centric innovations; protocols for sustainable wireless sensor networks; localisation algorithms for wireless sensor networks; deep learning models for social media misinformation; sentiment classification in social networking data; class imbalance learning techniques; password security and usability in authentication systems; innovative approaches in credit card fraud detection; innovative robotics for pipeline inspection systems

E-Mail Website
Guest Editor
Department of Informatics, Faculty of Engineering, Built Environment and Information Technology, University of Pretoria, Pretoria 0028, South Africa
Interests: ontology engineering for knowledge-based systems; explainable neural networks in artificial intelligence; machine learning innovations in intrusion detection systems; innovative approaches to missing value imputation; machine learning techniques for customer churn prediction; frameworks for effective multi-criteria decision making; game-based learning approaches; deep learning; chatbot integration; smart vehicle monitoring and safety systems

Special Issue Information

Dear Colleagues,

In today’s digital landscape, the principles of symmetry and asymmetry form the foundation of secure communication system design and analysis. Symmetric key cryptography, where the same key is used for both encryption and decryption, and asymmetric cryptography, which relies on public–private key pairs, together ensure data confidentiality, integrity, and authentication. However, the rapid escalation of cyber threats has created a pressing need for novel, lightweight cryptographic primitives and hybrid frameworks that combine computational efficiency with strong security.

Furthermore, the convergence of cryptography with artificial intelligence, machine learning, blockchain, and quantum-resilient technologies calls for innovative methods that intelligently utilize symmetric and asymmetric structures. This Special Issue will focus on exploring how symmetry/asymmetry principles are applied and extended in cryptographic systems and other data security frameworks.

We invite original research articles and review papers that contribute to the understanding and advancement of symmetry/asymmetry in data security systems.

Topics of interest include but are not limited to the following:

  • Symmetric and asymmetric cryptographic algorithms;
  • Security evaluation and formal verification of cryptographic schemes;
  • Symmetric key authentication and hash functions;
  • Hybrid cryptographic systems;
  • Post-quantum cryptographic constructions leveraging symmetry;
  • Asymmetric encryption for secure key exchange in IoT and mobile networks;
  • Symmetric cryptography for high-throughput environments (e.g., 5G/6G);
  • Applications of symmetry/asymmetry in blockchain security;
  • Symmetry for secure multiparty computation;
  • Cross-disciplinary approaches to modeling symmetric behavior in secure protocols.

We also welcome contributions that bridge theoretical frameworks with real-world implementations and those that explore symmetry/asymmetry in emerging domains such as zero-knowledge proofs, privacy-preserving computation, and homomorphic encryption.

We look forward to your valuable contributions to this Special Issue.

Dr. Mike Wa Nkongolo
Dr. Timothy T. Adeliyi
Prof. Dr. Daramola J. Olawande
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptographic primitives
  • symmetric key encryption
  • asymmetric cryptography
  • post-quantum security
  • blockchain security
  • secure multiparty computation
  • hybrid encryption schemes
  • privacy-preserving computation
  • lightweight cryptography
  • formal methods in cryptography
  • cybersecurity
  • IoT forensics
  • deep learning and NLP
  • Semantic data models
  • Smart environments
  • class imbalance
  • secure AI architectures
  • blockchain and distributed security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers

This special issue is now open for submission.
Back to TopTop