Cyber Warfare
A special issue of Future Internet (ISSN 1999-5903).
Deadline for manuscript submissions: closed (15 August 2016) | Viewed by 49097
Special Issue Editors
Interests: biometrics; security; cybersecurity; bio-cryptography
Special Issues, Collections and Topics in MDPI journals
Interests: artificial intelligence; cognitive modelling; machine learning
Interests: computational intelligence; decision analytics; cyber security
Interests: cybersecurity; privacy; Internet of Things; computer networks (including vehicular networks)
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Our increasing dependence on information and communication technologies (ICT) has escalated international concern for cyber-security in the face of politically, socially, and religiously motivated cyber-attacks. The explosion of smart devices in the home and industry is changing the definition of cyberspace, and leading to new types of threats and cyber-attack concepts including hactivism, cyber-terrorism and cyber-bullying.
Cyberspace is both information-rich and ICT dependent. It is well understood that possessing timely and accurate information can result in a competitive advantage, while tactics that interfere with the flow of information can challenge the well-being, success or survival of individuals and groups. Subsequently, important research directions are concerned with understanding the new nature of cyberspace, modelling and predicting the decision-making processes that will ensure information security in that space, as well as the developing novel technologies for preventing or mitigating cyber attacks.
In order to address these threats, this Special Issue intends to collect contributions describing current developments and future research directions in the area of “Cyber Warfare”. Potential topics include, but are not limited to:
- Cyber/information warfare
- Cyber/information security, network security, mobile and wireless communication security
- Cyber espionage, attacks, and crime
- Hacking, hactivism
- access and identity management
- Computational modelling in information/cyber warfare
- Cyber/information warfare decision-analytics
- Defensive and preventive mechanisms and techniques in information/cyber warfare, including intrusion detection and prevention systems, early warning systems, vulnerability assessment and penetration testing
- Classification and taxonomy of concepts, approaches, methods and tools related to information/cyber warfare
- Policy design in in information/ cyber warfare are welcome.
Prof. Dr. Jiankun Hu
Dr. Sherali Zeadally
Dr. Kathryn Merrick
Dr. Kamran Shafi
Guest Editors
Keywords
- Cyber warfare
- Information warfare
- Cyber security
- Cyber crime
- Cyber bullying
- Network security
- Hacking
- Hactivism
- Information warfare modelling including game theory
- Responding to and preventing information/cyber warfare
- Intrusion detection systems
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.
Related Special Issue
- Information Systems Security in Future Internet (26 articles)