Special Issue "Recent Advances in Cryptography and Network Security"

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: 30 October 2020.

Special Issue Editors

Prof. Dr. Dae-Ki Kang
Website1 Website2
Guest Editor
Machine Learning/Deep Learning Research Labs, Department of Computer Engineering, Dongseo University, Busan 47011, South Korea
Interests: multi-agent reinforcement learning; few shot learning/model-agnostic meta-learning; adversarial machine learning; generative adversarial network
Dr. Jiacang Ho
Website
Co-Guest Editor
IAI Labs and Machine Learning/Deep Learning Research Labs, Department of Computer Engineering, Dongseo University, Busan 47011, South Korea
Interests: adversarial machine learning; generative adversarial network; biometric authentication; artificial intelligence
Dr. Dhananjay Singh
Website
Co-Guest Editor
ReSESNE Labs, Department of Electronics Engineering, Hankuk (Korea) University of Foreign Studies (HUFS), Seoul 02450, South Korea
Interests: future data mobility; connected vehicles; smart city; future internet/5G; IoT; WSN; blockchain; wireless communication; cognitive computing; cybersecurity; artificial intelligence; adaptive security for cities
Special Issues and Collections in MDPI journals

Special Issue Information

Cryptography and network security focuses on the areas of cryptography and cryptanalysis that include network security, data security, mobile security, cloud security, and endpoint security, which are commonly used to protect users online. However, many researchers have used machine/deep learning techniques to strengthen the network security level. The aim of this Special Issue is to cover all aspects of the latest techniques, including their architectures, operations, and the optimization of their systems. Theoretical and practical developments in the implementation and operation of neural networks in network security, the latest technical reviews, and surveys on network security are welcomed. The papers will be peer-reviewed and selected on the basis of their quality and relevance to the theme of this Special Issue, with only the best high-quality papers selected for publication. The topics of interest for this Special Issue include but are not limited to the following:

  • Public-key cryptography and RSA;
  • Adversarial machine learning;
  • Pseudo-random number generation in cryptography;
  • Machine learning for cybersecurity;
  • Artificial intelligence dysfunctions;
  • Network security application;
  • Biometric authentication;
  • Web security;
  • System security;
  • Malicious software;
  • Blockchain technologies;
  • Adaptive security;
  • Future data security;
  • Mobile data security;
  • Challenges of cybersecurity;
  • Cybersecurity of communication technologies.

Prof. Dr. Dae-Ki Kang
Dr. Jiacang Ho
Dr. Dhananjay Singh
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1500 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
Network Anomaly Detection inside Consumer Networks—A Hybrid Approach
Electronics 2020, 9(6), 923; https://doi.org/10.3390/electronics9060923 - 01 Jun 2020
Abstract
With an increasing number of Internet of Things (IoT) devices in the digital world, the attack surface for consumer networks has been increasing exponentially. Most of the compromised devices are used as zombies for attacks such as Distributed Denial of Services (DDoS). Consumer [...] Read more.
With an increasing number of Internet of Things (IoT) devices in the digital world, the attack surface for consumer networks has been increasing exponentially. Most of the compromised devices are used as zombies for attacks such as Distributed Denial of Services (DDoS). Consumer networks, unlike most commercial networks, lack the infrastructure such as managed switches and firewalls to easily monitor and block undesired network traffic. To counter such a problem with limited resources, this article proposes a hybrid anomaly detection approach that detects irregularities in the network traffic implicating compromised devices by using only elementary network information like Packet Size, Source, and Destination Ports, Time between subsequent packets, Transmission Control Protocol (TCP) Flags, etc. Essential features can be extracted from the available data, which can further be used to detect zero-day attacks. The paper also provides the taxonomy of various approaches to classify anomalies and description on capturing network packets inside consumer networks. Full article
(This article belongs to the Special Issue Recent Advances in Cryptography and Network Security)
Show Figures

Figure 1

Back to TopTop