You are currently viewing a new version of our website. To view the old version click .

Cybersecurity in Information Systems and Technology

This special issue belongs to the section “Computer Science & Engineering“.

Special Issue Information

Dear Colleagues,

Concepts such as cybersecurity and cyber defense are becoming increasingly common in a society dominated by digital technology. In an ever-changing world where digitalization reaches all areas, cybersecurity has become a major necessity, as it poses a major risk to the sustainability of companies and their assets. In societies where banking, government, energy, transport, transportation, hospitals, etc., are handled by digital technology, securing these services and having appropriate mechanisms is critical.

Therefore, the security of information systems has become one of the most important aspects to be taken into account in the last decade and, to a large extent, for complex organizations that are characterized by a considerable volume of geographically distributed systems connected by the Internet. This is because such companies are more exposed to a huge increase in attacks aimed at stealing information assets, on the one hand, and, on the other hand, at extracting the maximum economic benefit from them. There are numerous threats to the information systems of organizations, such as cyber-attacks by cyber-terrorists, hackers, etc., viruses that spread through the Internet, social engineering attacks (e.g., phishing, among others), and even inappropriate use of information assets by employees of the organizations themselves.

Proposals for this Special Issue on ''Cybersecurity in Information Systems and Technology'' are requested to represent an overview of the current status of this research field, and extended versions of the best papers of the Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) LIVE cybersecurity conference (https://2021.jnic.es) are also invited to publish in this Special Issue. This Special Issue covers a variety of topics including, but not limited to, new standards, frameworks, methods, algorithms, solutions, and applications in the following areas:

  • Prevention, detection, and response;
  • Attack and Cybercrime Detection;
  • Security Event Monitoring;
  • Attacks and Vulnerabilities;
  • Forensic Analysis;
  • Cryptology, Cryptocurrencies, and Blockchain;
  • Mobile Device Security;
  • Cloud Computing Security;
  • IoT Security;
  • Industrial and Critical Infrastructure Security;
  • Dataset and Big Data Security;
  • Privacy and Access Control;
  • Information Systems and Software Security;
  • Risk Assessment and Security Management;
  • 5G Network Security;
  • Training and Educational Innovation

Dr. Cristina Alcaraz
Dr. Noemí de Castro García
Dr. Manuel A. Serrano
Dr. David G. Rosado
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • cyber defense
  • security in IoT
  • cloud computing
  • big data
  • mobile device
  • attacks
  • vulnerabilities
  • prevention
  • detection
  • response
  • risk assessment security management
  • industrial environments critical infrastructure security
  • cryptology
  • cryptocurrencies
  • blockchain

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Electronics - ISSN 2079-9292