Special Issue "AI for Cyber Forensics and Threat Investigations Challenges in Modern Assistive Technologies"
Deadline for manuscript submissions: 31 March 2021.
Interests: Applied cryptography; identifying security vulnerabilities; reverse engineering; privacy-enhancing technologies; multimedia security; IoT security; digital forensics investigations; malware analysis and detection; machine learning and social network analysis
Modern assistive technologies, such as robotics, content-centric networks, and IoT systems, have recently attracted huge attention from academia and industry. With the growth of connectivity between various heterogeneous technologies, numerous attack vectors, which can potentially be exploited for malicious or criminal purposes (e.g., data breaches, identity theft, and stealing of intellectual property and trade secrets), are constantly evolving. Recent cyberattacks have dangerously targeted a broad array of computing systems, varying from data centers and personal machines to mobile devices and industrial control systems. With the growing need for new methodologies, tools, and techniques, there is a need for the increased use of artificial intelligence (AI), machine learning, and data mining applications for cyber forensics and threat investigations problems.
The main motivation for this Special Issue is to provide a forum for researchers and practitioners working on cyber forensics and threat investigations for modern assistive technologies to disseminate current research issues and advances and discuss the major research challenges and achievements on various topics of interest.
Papers on practical as well as theoretical topics and problems in various topics related to cyber forensics and threat investigations are invited, with special emphasis on novel techniques and tools to collect data from modern assistive technologies, such as robotics, content-centric networks, and IoT systems.
Topics of interest include, but are not limited to:
- AI for spam detection;
- AI for phishing detection and prevention;
- AI for botnet detection;
- AI for intrusion detection and response;
- AI applications in cybersecurity and threat intelligence;
- Secure multiparty computation and cryptographic approaches;
- AI for privacy-preserving data mining;
- AI approaches to trust and reputation;
- AI for vulnerability testing through intelligent probing (e.g., fuzzing);
- AI for content-driven security policy management and access control;
- AI for anomalous behavior detection (e.g., authentication and fraud prevention).
We also encourage contributions describing innovative work in the realm of cybersecurity, cyber defense, and digital crimes.
Dr. Ahmed Elmesiry
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1500 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- ethical hacking;
- data protection;
- malware investigations;
- reverse engineering;
- threat intelligence;
- incident analysis;
- memory analysis;
- multimedia investigations;
- vulnerability assessment;
- network traffic investigations