Information Security, Data Preservation and Digital Forensics

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Security and Privacy".

Deadline for manuscript submissions: 31 December 2025 | Viewed by 8119

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Applied Mathematics and Informatics, Department of Informatics, Technical University of Sofia, Sofia, Bulgaria
Interests: security and privacy; industrial informatics; technology-enhanced learning
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Software Engineering and Information Systems, Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, Sofia, Bulgaria
Interests: codes theory; data bases; data protection; watermarking
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Laboratory for Open Systems and Networks—E5, Jožef Stefan Institute, Ljubljana, Slovenia
Interests: cybersecurity; privacy; identity management

Special Issue Information

Dear Colleagues,

This Special Issue aims to present contemporary problems and challenges in information security, data preservation and digital forensics, as well as possible solutions in the form of developed approaches, methods, methodologies and algorithms. The role of technologies, machine learning and artificial intelligence is also within the scope of consideration, due to their ever-increasing importance for implementing preventive and countermeasures corresponding to the complexity and severity of the attacks being conducted. Due to the sophistication of cybercrimes and the application of anti-forensic techniques by offenders, it is also necessary to create appropriate approaches for identifying and analyzing digital evidence. Studying the human behavior of the victim and attacker also contributes to understanding and reconstructing the cyber scene.

We want to invite authors who, through reviews or original research papers, will discuss and present important topics and point to future directions and trends.

The main topics are, but are not limited to, the following:

- Strategies in information security;

- Risk assessment;

- Modeling of contemporary attacks;

- Systems and applications security;

- Cryptography approaches;

- Human factors security;

- Data preservation techniques and algorithms;

- GDPR-based privacy;

- Privacy by design;

- Digital forensic models;

- Identification and analysis of evidence;

- Human behavior modeling.

Dr. Malinka Spasova Ivanova
Dr. Galina Bogdanova
Dr. Tomaž Klobučar
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • information security
  • contemporary attacks
  • applications security
  • data preservation
  • privacy by design
  • digital forensics

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

28 pages, 7919 KB  
Article
Automated Forensic Recovery Methodology for Video Evidence from Hikvision and Dahua DVR/NVR Systems
by Leila Rzayeva, Madi Shayakhmetov, Yernat Atanbayev, Ruslan Budenov and Hamza Mutaher
Information 2025, 16(11), 983; https://doi.org/10.3390/info16110983 - 13 Nov 2025
Viewed by 713
Abstract
Digital video surveillance systems are now common in the security infrastructure of modern times, but proprietary file systems provided by large manufacturers are a major challenge to the work of the forensic investigator. This paper proposes a forensic recovery methodology of Hikvision and [...] Read more.
Digital video surveillance systems are now common in the security infrastructure of modern times, but proprietary file systems provided by large manufacturers are a major challenge to the work of the forensic investigator. This paper proposes a forensic recovery methodology of Hikvision and Dahua surveillance systems by utilizing three major innovations: (1) adaptive temporal sequencing, which dynamically changes gap detection thresholds; (2) dual-signature validation with header–footer matching of DHFS frames; and (3) automatic manufacturer identification. The strategy puts into practice direct binary analysis of proprietary file systems, frame-based parsing and automatic video reconstruction. Testing on 27 surveillance hard drives showed a recovery rate of 91.8, a temporal accuracy of 96.7% and a false positive rate of 2.4%—the lowest of the tools tested with statistically significant improvements over commercial tools (p < 0.01). Better results with fragmented streams (87.2 vs. 82.4% with commercial tools) meet key forensic needs of determining valid evidence chronology. The open methodology offers the necessary algorithmic transparency to be court-admissible, and the automated MP4 conversion with metadata left intact makes the integration of forensic workflow possible. The study provides a scientifically validated approach to proprietary surveillance formats, which evidences technical innovativeness and practical usefulness to digital forensics investigations. Full article
(This article belongs to the Special Issue Information Security, Data Preservation and Digital Forensics)
Show Figures

Figure 1

48 pages, 8140 KB  
Article
Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm
by Reismary Armas and Hamed Taherdoost
Information 2025, 16(5), 336; https://doi.org/10.3390/info16050336 - 22 Apr 2025
Cited by 3 | Viewed by 6920
Abstract
Today, the world is experiencing constant technological evolution, allowing cyberattacks to manifest through different vectors and widely impacting victims, from specific users to serious damage to institutions’ integrity. Research has shown that a significant percentage of recorded cyber incidents are attributed to social [...] Read more.
Today, the world is experiencing constant technological evolution, allowing cyberattacks to manifest through different vectors and widely impacting victims, from specific users to serious damage to institutions’ integrity. Research has shown that a significant percentage of recorded cyber incidents are attributed to social engineering practices or human error. In response to this growing threat, reinforcing cybersecurity awareness among users has become an urgent strategy to develop and apply. However, addressing cybersecurity awareness is a difficult challenge, specifically in the HE industry, where cybersecurity awareness should be an essential part of this type of institution due to the amount of critical data it handles. In addition to the need to strengthen the preparation of new professionals, statistics have shown a significant increase in successful security attacks in this industry. Therefore, this study proposes a conceptual Cybersecurity Awareness and Training Framework for Higher Education to facilitate the establishment of systems that improve the cybersecurity awareness of students in any academic institution, extending to all audiences that coexist in it. This framework encompasses key components intended to continually improve the development, integration, delivery, and evaluation of cybersecurity knowledge for individuals directly or indirectly related to the institution’s information assets. Full article
(This article belongs to the Special Issue Information Security, Data Preservation and Digital Forensics)
Show Figures

Figure 1

Back to TopTop