New Challenges in Cyber Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: 15 October 2024 | Viewed by 300

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer and Information Sciences, Towson University, Towson, MD 21252, USA
Interests: cyber security; social network; digital twins and privacy

E-Mail Website
Guest Editor
Department of Computer Science at the University of Nevada, Las Vegas, NV 89154, USA
Interests: private machine learning; privacy inference attacks

E-Mail Website
Guest Editor
Department of Computer Science, City University of Hong Kong, Kowloon 999077, Hong Kong
Interests: wireless network and edge computing

Special Issue Information

Dear Colleagues,

In recent years, advances in the field of networking, communication and computation have led people to adopt distributed methods/resources for performing large-scale data processing, redefine the computing paradigm, and also focus on cyber security. The essential design objective of the current data processing framework is to build a unified, integrated, and holistic computing system that can efficiently and effectively organize and utilize diverse computing resources, ranging from computing powers in cloud centers to a sea of spare mobile end resources. The emergence of such an integrated system brings forward a unique network, where computing can be performed anytime, and anywhere and be initialized by anyone. For example, residents may request deep learning models for local business services, where the model could be jointly trained by mobile phones and laptops owned by local citizens, embedded computing units in public facilities and smart vehicles, as well as by edge and cloud servers by collecting training datasets.

However, this trend of adopting such novel computing paradigms and frameworks also brings unprecedented challenges in cyber security. Malicious individuals can conduct seamless and combinatorial attacks on heterogeneous devices deployed in extensively wide ranges. Potentially vulnerable devices include central servers, edge nodes, mobile devices and small Internet-of-Things gadgets. These devices have varied levels of robustness, availability, accessibility, and controllability; therefore, the current unified design for each device is impractical. Moreover, corresponding data and information for processing are also distributed and stored on multiple devices and device owners, which further aggravates cyber security issues, making it an integrated, sophisticated and long-lasting task. Generally, the protection of cyber security remains unsettled, despite the remarkable benefits brought by the generalized computing framework.

Therefore, this Special Issue solicits all categories of original studies and novel solutions which are required for handling novel challenges in cyber security in the upcoming unified computing paradigm, including novel theories, frameworks, techniques, and applications.

The topics of interest include, but are not limited to:

  • New fundamental architectures and frameworks for cyber security;
  • Novel theories and techniques on vulnerability detection;
  • Novel theories and techniques on encryption and decryption;
  • Novel theories and techniques on authentication and access control;
  • Secure data collection and aggregation mechanisms in distributed systems;
  • Novel techniques for secure communication;
  • Novel techniques and analysis for data privacy;
  • Novel secure and efficient edge computing techniques;
  • Secure and efficient data processing mechanisms in cloud–edge–terminal systems;
  • Secure and in-network data processing mechanisms in the hybrid Internet of Things;
  • Novel frameworks and techniques on federated learning;
  • Novel deep learning models for cyber security;
  • Novel demos, applications, and systems for cyber security.

Dr. Zhipeng Cai
Dr. Sai Akshita Maradapu Vera Venkata
Dr. Zuobin Xiong
Dr. Tuo Shi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber security
  • security and privacy
  • distributed data processing
  • internet of things
  • edge computing

Published Papers

This special issue is now open for submission.
Back to TopTop