Cybersecurity, Cryptography, and Machine Learning
A special issue of Cryptography (ISSN 2410-387X).
Deadline for manuscript submissions: closed (30 October 2021) | Viewed by 18389
Special Issue Editor
Interests: computer systems cybersecurity; machine learning; hardware security
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
Cybersecurity for the past decades has been in the front line of global attention as an increasingly critical area of concern. The ever-expanding complexity of modern computing systems has resulted in the growth of security vulnerabilities, making such systems appealing targets for sophisticated cyber-attacks. The rapid development of computing devices in various domains such as high-performance computing, cloud/edge/fog computing, embedded systems, mobile platforms, and Internet-of-Things (IoT) combined with emerging 5G cellular networks further exacerbates the impact of cybersecurity threats, calling for efficient security countermeasures to protect legitimate users from these attacks. Cryptography is one of the most important tools that has been widely deployed by researchers and practitioners in academia and industry to build secure information technology infrastructures ensuring the confidentiality of data and protecting users’ information from unauthorized access. Furthermore, advancements in the area of artificial intelligence and machine learning, driven by a significant increase in the size of data getting generated and transferred over networks, have resulted in successful applications of machine learning algorithms to automatically identify and analyze security threats protecting organizations against evolving cyber-attacks. As a result, the goal of this Special Issue is to highlight the latest technologies and solutions that focus on theory, analysis, experiments, or application of cybersecurity, cryptography, and machine learning in modern computing systems. Papers dealing with systematization of knowledge and survey papers are also welcome. Specific topics of interest include, but are not limited to:
- Cryptographic primitives and protocols
- Applied cryptography for cybersecurity
- Application of machine learning for cybersecurity and cryptography
- Artificial intelligence security (e.g., adversarial machine learning)
- Network security
- Intrusion detection systems
- Malware detection and identification
- Advanced persistent threats analysis
- Denial-of-Service (DoS) attacks and defenses
- Side-channel attacks analysis, detection, and mitigation techniques
- Hardware security and trust
- Formal methods for secure hardware and software
- Detection and prevention of hardware trojans
- Hardware and software reverse engineering
- Fault attacks and countermeasures
- FPGA design security
- Mobile security
- Internet-of-Things (IoT) security
- Vulnerability analysis techniques
- Cyber physical systems security and resilience
- Security and privacy for cloud, edge, and fog computing
- Cybersecurity metrics and assessment
Dr. Hossein Sayadi
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- Cybersecurity
- Cryptography
- Machine Learning
- Threats and Countermeasures
- Intrusion Detection
- Side-Channel Attacks
- Malware
- Adversarial Learning
- Physical Attacks
- IoT Security
- Fault attacks
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.