Special Issue "Network and Information Security: Threats, Vulnerabilities, Detection and Management"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: 31 July 2023 | Viewed by 581

Special Issue Editor

College of Computer Science and Technology, National Huaqiao University, Xiamen 361021, China
Interests: network and information security; information hiding; artificial intelligence

Special Issue Information

Dear Colleagues,

With the vigorous development of the Internet, information technology has dramatically brought many opportunities and conveniences to people's lives. However, these opportunities have also created serious risks in relation to information security. Therefore, there has been a tremendous increase in research in the area of network and information security.

The importance and impact of network and information security are significantly increasing. Network and information security is an interdisciplinary field that combines a set of areas including computer science, software development, data science, and communication network. As a research topic, network and information security apply scientific methods, processes, algorithms, and systems to extract threats and vulnerabilities from structured and unstructured data to solve various security problems in practical applications.

Network and information security involve government, military, culture, education, finance, scientific research, energy, business, and other fields. Its research contents mainly include access control, authentication, biometrics, cryptography, cyber-physical systems, information hiding, Intrusion detection, malware, quantum cryptography, sensor networks, and usable security.

This Special Issue will discuss this trending topic and present innovative solutions to show the importance of network and information security to researchers, managers, industry, society, and other communities.

Prof. Dr. Hui Tian
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • access control
  • authentication
  • computer crime
  • computer security
  • computer viruses
  • cryptography
  • cyber security
  • cyber-attacks
  • data security
  • data privacy protection
  • digital watermarking
  • information security
  • information hiding
  • intrusion detection
  • malware
  • mobile security
  • network security
  • privacy computing
  • security policy
  • security requirements
  • security systems
  • steganography
  • steganalyis

Published Papers

This special issue is now open for submission, see below for planned papers.

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: ECHO in Action: Bridging the cyber security skills gap
Authors: Ioannis Chalkias; Cagatay Yucel; Jane Henriksen-Bulmer; Vasilis Katos; Huseyin Dogan; Paul Whittington
Affiliation: Bournemouth University
Abstract: This paper is presenting the reuslts and evaluations from an event that was organised as part of ECHO show case for demonstrating the outputs and assets from the project. These assets include a federated cyber range that facilititates multi-sector, transversal cyber security scenarios and an early warning system fro sharing cyber threat intelligence between organisations and sectors in real-time. This paper presents the demonstration of cyber security training scenarios on federated cyber ranges and its implications over the incident response. Using the Early Warning system (EWS), we trained just under a hundred students in incident response detection and prevention, followed by an incident response exercise where students had to defend againist the attacks conducted through federated cyber range in real-time.

Back to TopTop