applsci-logo

Journal Browser

Journal Browser

Safety, Reliability and Security Assurance of Cyber Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (18 February 2025) | Viewed by 1352

Special Issue Editors


E-Mail
Guest Editor
Electronic Information School, Wuhan University, Wuhan 430072, China
Interests: cyber-physical resilience; game theory applications in smart grid
Special Issues, Collections and Topics in MDPI journals

E-Mail
Guest Editor
School of Electrical Engineering and Automation, Wuhan University, Wuhan 430072, China
Interests: cyber-physical resilience; vulnerability analysis of interdependent networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the rapid digitization and integration of cyber systems across critical sectors, such as healthcare, energy, finance, and transportation, the need for robust safety, reliability, and security measures has become more pronounced. These systems form the backbone of modern infrastructures, and their failure can result in catastrophic outcomes, from widespread operational disruptions to significant financial losses and threats to human safety. As cyber systems become more complex and interconnected, they are increasingly exposed to a variety of risks, including malicious cyber-attacks, unintentional software flaws, operational failures, and vulnerabilities arising from the integration of new technologies. Thus, ensuring the safety, reliability, and security of these systems is of paramount importance.

This Special Issue focuses on recent advances in ensuring the safety, reliability, and security of cyber systems. We encourage the submission of original research on topics including risk assessment, secure software development, system reliability engineering, cyber-physical system safety, intrusion detection and prevention, resilience mechanisms, and formal methods for security assurance. Additionally, we welcome interdisciplinary research on innovative approaches such as artificial intelligence, advanced cryptographic techniques, and cutting-edge cybersecurity strategies for ensuring the reliability and security of cyber systems.

Dr. Meng Tian
Dr. Zhengcheng Dong
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber systems
  • risk assessment
  • cybersecurity
  • resilience
  • reliability engineering
  • cyber-physical system safety
  • intrusion detection and prevention
  • AI technologies

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

32 pages, 3567 KiB  
Article
Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks
by Junbeom Park, Taehoon Eom, Hyungeun Kim, Hyeonsu Park, Zizung Yoon and Jongsou Park
Appl. Sci. 2025, 15(5), 2751; https://doi.org/10.3390/app15052751 - 4 Mar 2025
Viewed by 903
Abstract
The rapid expansion of satellite networks has enabled the widespread deployment of satellite-based services across various sectors. However, these networks often prioritize cost-effectiveness over security considerations, leading to inherent architectural vulnerabilities. The complex architecture, comprising heterogeneous devices, operating systems, and communication protocols, exacerbates [...] Read more.
The rapid expansion of satellite networks has enabled the widespread deployment of satellite-based services across various sectors. However, these networks often prioritize cost-effectiveness over security considerations, leading to inherent architectural vulnerabilities. The complex architecture, comprising heterogeneous devices, operating systems, and communication protocols, exacerbates security risks and broadens the attack surface. Attackers can exploit these threat vectors to compromise system availability and data integrity. Prior research has primarily focused on specific security improvements, providing limited comprehensive evaluations and systematic threat modeling. This study proposes a systematic approach for modeling and analyzing satellite network security. A security framework originally developed for traditional networks has been adapted for satellite environments. Utilizing the Threat Vector–Hierarchical Attack Representation Model (TV-HARM), this study comprehensively models and analyzes threat vectors and network security. Key attack paths are identified, and vulnerabilities are quantitatively assessed using three refined security metrics. The experimental results reveal residual threats despite existing security measures, underscoring the need for robust defense strategies. This study presents a systematic framework for evaluating satellite network security, demonstrating the applicability and effectiveness of the proposed methodologies. These findings contribute to enhanced threat mitigation strategies and the overall improvement of satellite network security by addressing critical vulnerabilities. Full article
(This article belongs to the Special Issue Safety, Reliability and Security Assurance of Cyber Systems)
Show Figures

Figure 1

Back to TopTop