Novel Approaches for Cybersecurity and Cyber Defense
A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".
Deadline for manuscript submissions: 30 April 2026 | Viewed by 7
Special Issue Editors
Interests: cryptography; searchable encryption; homomorphic encryption; biometry; identity-based encryption
Special Issue Information
Dear Colleagues,
The rapid expansion of interconnected systems, ranging from essential infrastructure to consumer Internet of Things (IoT) devices, has expanded the scope of cyberspace. Advancements in 5G communication, edge computing, cloud-native services, and Artificial Intelligence (AI) automation have made digital ecosystems more complex and flexible. These innovations enhance operational efficiency and promote innovation, but they also significantly increase the attack surface, making systems vulnerable to more advanced cyber threats such as Advanced Persistent Threats (APTs), zero-day exploits, ransomware, and AI-powered intrusions.
Cybersecurity and cyber defense now face the critical challenge of protecting heterogeneous systems against an increasing range of risks, from data breaches and ransomware to AI-generated attacks and supply chain exploits. The limitations of traditional defense strategies, often reactive and perimeter-based, have highlighted the need for proactive, intelligent, and resilient methods that can operate across dynamic, interconnected environments.
This Special Issue seeks to present novel methodologies, technologies, and frameworks that address emerging challenges in cybersecurity and cyber defense. We welcome high-quality submissions that provide theoretical advances, practical implementations, and interdisciplinary perspectives. Both academic research and industry-driven case studies are encouraged.
Topics of interest include, but are not limited to, the following:
- AI and machine learning for threat detection, risk assessment, and response automation;
- Secure architectures for IoT, edge, and cloud systems;
- Blockchain and distributed ledger technologies in cybersecurity applications;
- Zero Trust and adaptive access control models;
- Quantum-resilient cryptographic protocols;
- Cyber situational awareness and attack surface monitoring;
- Digital forensics, malware analysis, and anomaly detection;
- Security in critical infrastructures;
- Privacy-preserving computation and secure data sharing;
- Integration of human factors and socio-technical considerations in cyber defense.
This Special Issue aims to promote knowledge exchange between academia and industry and to support the development of next-generation cybersecurity solutions that are scalable, adaptive, and resilient in real-world scenarios.
Dr. Stefania Loredana Nita
Prof. Dr. Ion Bica
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- cybersecurity
- cyber defense
- threat detection
- secure architectures
- privacy-preserving technologies
- blockchain security
- AI in cybersecurity
- zero trust
- post-quantum cryptography
- critical infrastructure protection
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.
Further information on MDPI's Special Issue policies can be found here.