Intrusion Detection and Threat Intelligence for IoT and Cloud

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (20 June 2019) | Viewed by 465

Special Issue Editors


E-Mail Website
Guest Editor
School of Engineering and Information technology, University of New South Wales Canberra, Northcott Drive, Canberra, ACT 2610, Australia
Interests: biometrics; security; cybersecurity; bio-cryptography
Special Issues, Collections and Topics in MDPI journals
School of Engineering and Information Technology, University of New South Wales at ADFA, Canberra, ACT 2612, Australia
Interests: intrusion detection; threat intelligence; privacy preservation; digital forensics; machine/deep learning; network systems; IoT; cloud
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

IoT devices connected to cloud and edge paradigms offer many new opportunities and benefits for manufacturers and consumers. The ubiquitous norm of IoT technology allows new use cases in manufacturing, smart cities, smart factories and other market verticals. However, the security of IoT has not kept pace with the innovation and deployment of solutions that create economic and political issues. The growing number of IoT devices and services increases the attack landscape such as Distributed Denial of Services (DDoS) and ransomware, making the solutions more vulnerable to cyber-attacks. Consequently, assuring the security of each component within an IoT system is crucial in keeping cyber hackers from using it in an unauthorized manner.

This Special Issue will focus on cutting-edge of intrusion detection and threat intelligence techniques for IoT, cloud, mobile, and fog computing paradigms. The topics could include one of the following (but not limited):

  • Collaborative Intrusion Detection for Cloud and IoT
  • Anomaly Detection for DDoS on Cloud and Fog Paradigms
  • Anomaly Detection for Ransomware in IoT Networks
  • Detecting Abnormal Behaviors based on Telemetry Data
  • Threat Intelligence for Advanced Persistent Threats (APT)
  • Adversarial Deep Learning for Threat Intelligence in IoT Systems
  • Privacy-Preserving Anomaly Detection in Computing Paradigms
  • Threat Detection for Computing Resources of Cloud Servers
  • Protection and Mitigation of Sensitive Information of Users and Organizations

Prof. Dr. Jiankun Hu
Dr. Nour Moustafa
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop