You are currently viewing a new version of our website. To view the old version click .

Cyber Warfare

Special Issue Information

Dear Colleagues,

Our increasing dependence on information and communication technologies (ICT) has escalated international concern for cyber-security in the face of politically, socially, and religiously motivated cyber-attacks. The explosion of smart devices in the home and industry is changing the definition of cyberspace, and leading to new types of threats and cyber-attack concepts including hactivism, cyber-terrorism and cyber-bullying.

Cyberspace is both information-rich and ICT dependent. It is well understood that possessing timely and accurate information can result in a competitive advantage, while tactics that interfere with the flow of information can challenge the well-being, success or survival of individuals and groups. Subsequently, important research directions are concerned with understanding the new nature of cyberspace, modelling and predicting the decision-making processes that will ensure information security in that space, as well as the developing novel technologies for preventing or mitigating cyber attacks.

In order to address these threats, this Special Issue intends to collect contributions describing current developments and future research directions in the area of “Cyber Warfare”. Potential topics include, but are not limited to:

  • Cyber/information warfare
  • Cyber/information security, network security, mobile and wireless communication security
  • Cyber espionage, attacks, and crime
  • Hacking, hactivism
  • access and identity management
  • Computational modelling in information/cyber warfare
  • Cyber/information warfare decision-analytics
  • Defensive and preventive mechanisms and techniques in information/cyber warfare, including intrusion detection and prevention systems, early warning systems, vulnerability assessment and penetration testing
  • Classification and taxonomy of concepts, approaches, methods and tools related to information/cyber warfare
  • Policy design in in information/ cyber warfare are welcome.

Prof. Dr. Jiankun Hu
Dr. Sherali Zeadally
Dr. Kathryn Merrick
Dr. Kamran Shafi
Guest Editors

Keywords

  • Cyber warfare
  • Information warfare
  • Cyber security
  • Cyber crime
  • Cyber bullying
  • Network security
  • Hacking
  • Hactivism
  • Information warfare modelling including game theory
  • Responding to and preventing information/cyber warfare
  • Intrusion detection systems

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Published Papers

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Future Internet - ISSN 1999-5903