- 4.2Impact Factor
- 7.5CiteScore
- 17 daysTime to First Decision
Using New Technologies in Cyber Security Solutions (3rd Edition)
This special issue belongs to the section “ICT Infrastructures for Cybersecurity“.
Special Issue Information
Dear Colleagues,
In this Special Issue of Computers, we welcome original research articles and comprehensive reviews addressing various aspects of cyber security. Contributions presenting novel technologies, methods, and applications in the field of cyber security are encouraged. Example research areas include, but are not limited to, the following:
- Using blockchain technologies on cyber security solutions;
- Using LLMs, deep learning and active learning on cyber security solutions;
- IoT, virtualization, and cloud computing security;
- Security and privacy issues in metaverse;
- Using pot-quantum cryptographic solutions;
- Secure smart contracts;
- Cyber-attacks on blockchain technology;
- Novel cybercrimes on social media using deepfake technology.
Recently, most daily activities have shifted into the digital realm. While this digital transformation offers numerous benefits, it has also made individuals and organizations increasingly vulnerable to cyber-attacks. According to recent reports, by 2025, cybercrime is projected to cost the global economy approximately USD 10 trillion, making it one of the most profitable illicit sectors worldwide. The volume of cyber-related crimes continues to rise, and no single technique or method has yet proven capable of effectively stopping attackers. As soon as cyber defenders develop solutions to known attacks, cybercriminals respond with new, previously unseen attack strategies—remaining, in most cases, one step ahead.
Emerging technologies such as blockchain, smart contracts, virtualization, large language models (LLMs), deep learning, active learning, and post-quantum crypto offer promising directions for advancing cyber security. Therefore, this Special Issue welcomes original research articles and reviews that apply novel technologies and methodologies to various domains within cyber security. The goal of this Issue is to present innovative ideas, expand scholarly understanding, and provide propose efficient, forward-looking solutions to counteract cybercrime.
Prof. Dr. Leandros Maglaras
Prof. Dr. Helge Janicke
Dr. Alexios Lekidis
Dr. Mohamed Amine Ferrag
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- LLM cybersecurity solutions
- post-quantum crypto
- deepfake attacks
- metaverse cybersecurity
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Related Special Issues
- Using New Technologies on Cyber Security SolutionsinComputers (10 articles)
- Using New Technologies in Cyber Security Solutions (2nd Edition)inComputers (17 articles)

