Next Article in Journal
An Upper Bound of the Third Hankel Determinant for a Subclass of q-Starlike Functions Associated with k-Fibonacci Numbers
Previous Article in Journal
Effect of Zinc Oxide Nano-Additives and Soybean Biodiesel at Varying Loads and Compression Ratios on VCR Diesel Engine Characteristics
Previous Article in Special Issue
Malware Classification Using Simhash Encoding and PCA (MCSP)
Open AccessEditorial

Symmetry-Adapted Machine Learning for Information Security

Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), 232 Gongneung-ro, Nowon-gu, Seoul 01811, Korea
Symmetry 2020, 12(6), 1044;
Received: 15 June 2020 / Accepted: 16 June 2020 / Published: 22 June 2020
(This article belongs to the Special Issue Symmetry-Adapted Machine Learning for Information Security)
Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for supporting defense against security threats. However, these existing approaches have failed to deal with security challenges in next-generation ICT systems due to the changing behaviors of security threats and zero-day attacks, including advanced persistent threat (APT), ransomware, and supply chain attacks. The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data. It offers the identification of unknown and new attack patterns by extracting hidden data patterns in next-generation ICT systems. Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis. View Full-Text
Keywords: symmetry; intrusion detection system; machine learning; image watermarking; information security; IoT security; indoor positioning system symmetry; intrusion detection system; machine learning; image watermarking; information security; IoT security; indoor positioning system
MDPI and ACS Style

Park, J.H. Symmetry-Adapted Machine Learning for Information Security. Symmetry 2020, 12, 1044.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Search more from Scilit
Back to TopTop