Applied Artificial Intelligence in Cybersecurity: Practices, Challenges, and Innovations

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 November 2023)

Special Issue Editors


E-Mail Website
Guest Editor
Department of Software Convergence, Andong National University, Andong 36729, South Korea
Interests: Cybersecurity; Computer vision; Image forensics; Machine learning

E-Mail Website
Guest Editor
Applied Research Center, Florida International University, Miami, FL, USA
Interests: Cybersecurity; Malware Analysis; Virtual Memory Introspection; Cloud Computing; Machine Learning; Cyber & Network Forensic; Blockchain

E-Mail Website
Guest Editor
Department of Electrical and Computer Engineering, Florida International University, Miami, FL 33174, USA
Interests: quantum computing; artificial intelligence; machine learning; deep learning; big data; visualization; cybersecurity; advanced cyber analytics; memory forensics
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Moss Department of Construction Management, Florida International University, Miami, FL, USA
Interests: Applied artificial intelligence; robotics; remote systems; big data; Nuclear waste management; cyber analytics/visualization; cyber forensics; malware analysis
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Electrical & Computer Engineering, Florida International University, Miami, FL, USA
Interests: CyberSecurity; Business Intelligence; Mobile Technology/Malware; Network Security; Digital Forensics

Special Issue Information

This Special Issue highlights the applications, practices, and theories of artificial intelligence in cybersecurity. In the past few decades, there has been an exponential rise in the application of artificial intelligence technologies (such as deep learning, machine learning, etc.) for solving complex and intricate problems arising in cybersecurity. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. The primary objective of this Special Issue is to bring forward thorough, in-depth, and well-focused developments of applied artificial intelligence technologies and their applications in cybersecurity, propose new approaches, and present innovative approaches in real facilities. 

AI can be both a blessing and a curse for cybersecurity. AI is being used both as a sword (i.e., in support of malicious attacks) and as a shield (to counter cybersecurity risks). With an additional complication: while the use of AI for defensive purposes faces several constraints, significantly as governments (and the European Union) move to regulate high-risk applications and promote the responsible use of AI, on the attack side, the most pernicious uses are multiplying, the cost of developing applications is plummeting, and the ‘attack surface’ is becoming denser every day, making any form of defense an uphill battle. Cybersecurity in IoT is a complex and challenging issue, as these devices are often designed with limited processing power and memory, making them vulnerable to various attacks.

Machine-learning and deep-learning techniques will make sophisticated cyber-attacks easier and allow for faster, better targeted, and more destructive attacks. The impact of AI on cybersecurity will likely expand the threat landscape, introduce new threats, and alter the typical characteristics of threats. In addition, other than introducing new and powerful vectors to carry out attacks, AI systems will also become increasingly subject to manipulation. Responsible AI refers to the ethical and transparent design, development, and deployment of artificial intelligence systems. As AI is increasingly integrated into various areas of our lives, the technology must be used in a way that is beneficial to society and aligns with human values.

AI will become increasingly indispensable to managing cyber threats in the cybersecurity sector. The market is expected to grow with a Compound Annual Growth Rate (CAGR) of 23.6% from 2020 to 2027 and to reach USD 46.3 billion by 2027. At the same time, adopting AI is not without risks in itself: more than 60% of companies adopting AI recognize cybersecurity risks generated by AI as the most relevant ones. The basic idea is to propose new approaches and ideas and to present applications of those innovative approaches in real-time environments.

Dr. Saurabh Agarwal
Dr. Tushar Bhardwaj
Dr. Upadhyay Himanshu
Dr. Leonel E. Lagos
Prof. Dr. Alexander Perez Pons
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity, applied artificial intelligence, network forensics, machine learning, deep learning, anomaly detection, block chain, cybersecurity in IoT, deepfake, responsible AI, federated learning, AI trust, adversarial AI

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop