applsci-logo

Journal Browser

Journal Browser

Data Mining and Machine Learning in Cybersecurity, 2nd Edition

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 10 October 2026 | Viewed by 1408

Special Issue Editors


E-Mail Website
Guest Editor
School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China
Interests: artificial intelligence security; cyber attack and defense; situation awareness analysis; big data analysis; intelligent connected vehicle; knowledge graph
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Engineering, University of New South Wales, Sydney, NSW 2052, Australia
Interests: graph processing; graph neural networks; spatial data processing
Special Issues, Collections and Topics in MDPI journals

E-Mail
Guest Editor
School of Computer, National University of Defense Technology, Changsha 410073, China
Interests: big data; data mining; spatial databases; cyberspace security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue aims to showcase the latest advancements in the field of data mining and machine learning in cybersecurity. The information revolution has changed how we communicate all around the world and has drawn unprecedented attention to network security issues. This Special Issue seeks to explore innovative techniques, methodologies, and tools that enhance our ability to detect, analyze, and respond to network security effectively.

Authors are invited to contribute original research papers and conceptual articles addressing various aspects of network attack detection and situation awareness analysis for the comprehensive evaluation of various elements in the time and space environments of overall network security. This may include topics such as intrusion detection systems, anomaly detection algorithms, data mining/machine learning-driven approaches, threat intelligence integration, and real-time monitoring solutions.

In this Special Issue, we invite submissions exploring cutting-edge research and recent advances in the field of network security. Both theoretical and experimental studies are welcome, as are comprehensive review and survey papers.

Suitable topics include, but are not limited to, the following:

  • Network attack detection;
  • Situation awareness analysis;
  • Anomaly detection;
  • Intrusion detection systems;
  • Cyber threat analysis;
  • Network forensics;
  • In-vehicle network security;
  • Graph-based approaches for network security;
  • Cyber adversarial attacks and defenses;
  • Explainable artificial intelligence for network security.

Prof. Dr. Zhaoquan Gu
Dr. Xiaoyang Wang
Prof. Dr. Aiping Li
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • network attack
  • network defense
  • artificial intelligence
  • data mining

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Related Special Issue

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

38 pages, 1891 KB  
Review
Uncovering the Security Landscape of Maritime Software-Defined Radios: A Threat Modeling Perspective
by Erasmus Mfodwo, Phani Lanka, Ahmet Furkan Aydogan and Cihan Varol
Appl. Sci. 2026, 16(2), 813; https://doi.org/10.3390/app16020813 - 13 Jan 2026
Viewed by 1033
Abstract
Maritime transportation accounts for approximately 80 percent of global trade volume, with modern vessels increasingly reliant on Software-Defined Radio (SDR) technologies for communication and navigation. However, the very flexibility and reconfigurability that make SDRs advantageous also introduce complex radio frequency vulnerabilities exposing ships [...] Read more.
Maritime transportation accounts for approximately 80 percent of global trade volume, with modern vessels increasingly reliant on Software-Defined Radio (SDR) technologies for communication and navigation. However, the very flexibility and reconfigurability that make SDRs advantageous also introduce complex radio frequency vulnerabilities exposing ships to threats that jeopardize vessel security, and this disrupts global supply chains. This survey paper systematically examines the security landscape of maritime SDR systems through a threat modeling lens. Following Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines, we analyzed 84 peer-reviewed publications (from 2002 to 2025) and applied the STRIDE framework to identify and categorize maritime SDR threats. We identified 44 distinct threat types, with tampering attacks being most prevalent (36 instances), followed by Denial of Service (33 instances), Repudiation (30 instances), Spoofing (23 instances), Information Disclosure (24 instances), and Elevation of Privilege (28 instances). These threats exploit vulnerabilities across device, software, network, message, and user layers, targeting critical systems including Global Navigation Satellite Systems, Automatic Identification Systems, Very High Frequency or Digital Selective Calling systems, Electronic Chart Display and Information Systems, and National Marine Electronics Association 2000 networks. Our analysis reveals that maritime SDR threats are multidimensional and interdependent, with compromises at any layer potentially cascading through entire maritime operations. Significant gaps remain in authentication mechanisms for core protocols, supply chain assurance, regulatory frameworks, multi-layer security implementations, awareness training, and standardized forensic procedures. Further analysis highlights that securing maritime SDRs requires a proactive security engineering that integrates secured hardware architectural designs, cryptographic authentications, adaptive spectrum management, strengthened international regulations, awareness education, and standardized forensic procedures to ensure resilience and trustworthiness. Full article
(This article belongs to the Special Issue Data Mining and Machine Learning in Cybersecurity, 2nd Edition)
Show Figures

Figure 1

Back to TopTop