Using New Technologies in Cyber Security Solutions (3rd Edition)

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "ICT Infrastructures for Cybersecurity".

Deadline for manuscript submissions: 31 August 2026 | Viewed by 2

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Interests: critical infrastructure security; IoT security & privacy; intrusion detection systems; incident response
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Centre for Securing Digital Futures, Edith Cowan University, Perth, WA 6027, Australia
Interests: cyber security; security of industrial control systems/SCADA; digital forensics; cyber physical systems
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Energy Systems, University of Thessaly, Geopolis, 41500 Larissa, Greece
Interests: industrial Internet of Things; network-based intrusion detection; incident response; 5G and next-generation networks; intelligent energy systems; vehicle-to-everything
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Information Technology, United Arab Emirates University (UAEU), Al Ain 15551, United Arab Emirates
Interests: agricultural internet of things; wireless network security; network coding security; applied cryptography

Special Issue Information

Dear Colleagues,

In this Special Issue of Computers, we welcome original research articles and comprehensive reviews addressing various aspects of cyber security. Contributions presenting novel technologies, methods, and applications in the field of cyber security are encouraged. Example research areas include, but are not limited to, the following:

  • Using blockchain technologies on cyber security solutions;
  • Using LLMs, deep learning and active learning on cyber security solutions;
  • IoT, virtualization, and cloud computing security;
  • Security and privacy issues in metaverse;
  • Using pot-quantum cryptographic solutions;
  • Secure smart contracts;
  • Cyber-attacks on blockchain technology;
  • Novel cybercrimes on social media using deepfake technology.

Recently, most daily activities have shifted into the digital realm. While this digital transformation offers numerous benefits, it has also made individuals and organizations increasingly vulnerable to cyber-attacks. According to recent reports, by 2025, cybercrime is projected to cost the global economy approximately USD 10 trillion, making it one of the most profitable illicit sectors worldwide. The volume of cyber-related crimes continues to rise, and no single technique or method has yet proven capable of effectively stopping attackers. As soon as cyber defenders develop solutions to known attacks, cybercriminals respond with new, previously unseen attack strategies—remaining, in most cases, one step ahead.

Emerging technologies such as blockchain, smart contracts, virtualization, large language models (LLMs), deep learning, active learning, and post-quantum crypto offer promising directions for advancing cyber security. Therefore, this Special Issue welcomes original research articles and reviews that apply novel technologies and methodologies to various domains within cyber security. The goal of this Issue is to present innovative ideas, expand scholarly understanding, and provide propose efficient, forward-looking solutions to counteract cybercrime.

Prof. Dr. Leandros Maglaras
Prof. Dr. Helge Janicke
Dr. Alexios Lekidis
Dr. Mohamed Amine Ferrag
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • LLM cybersecurity solutions
  • post-quantum crypto
  • deepfake attacks
  • metaverse cybersecurity

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Related Special Issues

Published Papers

This special issue is now open for submission.
Back to TopTop