Advanced Security Threats Detection and Prediction for Internet-of-Things

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (30 November 2022) | Viewed by 917

Special Issue Editors

E-Mail Website
Guest Editor

Special Issue Information

Dear Colleagues,

The global deployment of the Internet of Things has become more mature which has allowed connection and data exchange between devices and systems over the internet and communication networks. This has led to a significant annual growth rate of the cybersecurity market of 11.7% in order to protect the networks and systems from security threats [1].

In the old days, traditional machine learning algorithms were applied for security threat detection problems, in a lightweight and less computationally intensive manner. With the advent of technological development, more data are available, computational power has become less costly, and advanced algorithms such as deep learning, transfer learning, reinforcement learning, and optimization algorithms can be applied to further enhance the performance of the models.

The security threat detection problem can be formulated as a detection problem which examines the current status of a network/system. As a preventive measure, the prediction of future status has become an emergent research area that provides in-advance prediction. Mainly, it is challenged by a large portion of unseen data and requires domain knowledge to study the characteristics of data distribution.

[1] Justina Alexandra Sava, Cybersecurity market revenues worldwide 2021-2026, Statista, 14 Feb. 2022. Retrieved 1 May 2022 Online from

This Special Issue intends to report high-quality research on security threat detection and prediction for the Internet of Things, more specifically state-of-the-art theories, methodologies, and systems for the design, development, deployment, and innovative use of artificial intelligence and advanced algorithms for applications in the Internet of Things. The topics of interest include, but are not limited to, the following:

  • Account takeover attacks;
  • Artificial intelligence;
  • Big data;
  • Deep learning;
  • DoS/DDoS attacks;
  • Insider threats;
  • Intrusion detection;
  • Network security;
  • Machine learning;
  • Malware (e.g., trojans, worms, and viruses);
  • Optimization;
  • Phishing attacks;
  • Predictive modeling;
  • Ransomware;
  • Sensor networks;
  • Web attacks.

Dr. Kwok Tai Chui
Dr. Brij Gupta
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop