Theory and Application of Network and Information Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 15 August 2024 | Viewed by 89

Special Issue Editors


E-Mail Website
Guest Editor
Viseu Polytechnic, School of Technology and Management of Viseu, Av. Cidade Politécnica, 3504-510 Viseu, Portugal
Interests: ICT security; critical infrastructure protection; trust and reputation systems; computer networks; smart cities

E-Mail Website
Guest Editor
Institute of Computing, Poznan University of Technology, 60-965 Poznan, Poland
Interests: information systems security; cryptography; risk analysis and management methods in informatics

E-Mail Website
Guest Editor
Institute of Communication and Computer Networks, Faculty of Computing and Telecommunications, Poznan University of Technology, ul. Polanka 3, 60-965 Poznan, Poland
Interests: tele-traffic; performance evaluation; communications networks; switching and routing; traffic control; elastic optical switching networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Informatics Department, Polytechnic of Viseu, 3504-510 Viseu, Portugal
Interests: forensics; compliance auditing; ICT security; 5G security; critical infrastructure protection; computer networks; artificial intelligence; machine learning

Special Issue Information

Dear Colleagues,

Our society is increasingly dependent on computing services, which are raising security risks that threat actors take advantage of. This scenario can lead to a loss of privacy, physical damage, economic losses, or even endanger our safety. Different verticals, such as Industry 4.0, Smart Cities, and critical infrastructures, are demanding security for networks and information assets available in on-premise, cloud-based, or cloud-native environments.

This Special Issue explores the theoretical foundations and practical applications for improving security and increasing the confidentiality, integrity, and availability of networks and information.

This Special Issue aims to showcase original, high-impact research to protect assets, detect, investigate, and respond to threats by applying cutting-edge methods, techniques, protocols, and technologies on security topics such as:

  • Privacy;
  • Trust;
  • Risk management;
  • Forensic analysis;
  • Compliance auditing;
  • Cryptography;
  • Cryptoanalysis;
  • Intrusion and anomaly detection;
  • Incident response;
  • IoT security.

Researchers are encouraged to submit their work to improve network and information security.

Prof. Dr. Filipe Caldeira
Dr. Anna Grocholewska-Czuryło
Prof. Dr. Mariusz Głąbowski
Prof. Dr. João Henriques
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • privacy
  • trust
  • risk management
  • forensic analysis
  • compliance auditing
  • cryptography intrusion and anomaly detection
  • incident response
  • IOT security

Published Papers

This special issue is now open for submission.
Back to TopTop