Special Issues

Journal of Cybersecurity and Privacy publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic and all Special Issue submissions follow MDPI's standard editorial process. The journal’s Editor-in-Chief and/or designated Editorial Board Member will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. Further information on MDPI's Special Issue policies and Guest Editor responsibilities can be found here. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
Cybersecurity in the Age of AI and IoT: Challenges and Innovations
edited by and
submission deadline 10 Aug 2025 | 1 articles | Viewed by 2669 | Submission Open
Keywords: artificial intelligence (AI); internet of things (IoT); cybersecurity; AI-driven applications; threat modeling; risk assessment; intrusion detection; machine learning; privacy protection; data protection; financial markets security; government security strategies; emerging trends; secure AI applications; secure iot systems
(This special issue belongs to the Section Security Engineering & Applications)
Multimedia Security and Privacy
edited by
submission deadline 10 Oct 2025 | 3 articles | Viewed by 16792 | Submission Open
(This special issue belongs to the Section Security Engineering & Applications)
Advanced Technologies for Detecting Cybersecurity Attacks in Internet of Things Systems submission deadline 20 Oct 2025 | Viewed by 159 | Submission Open
Keywords: IoT security; cybersecurity attacks; anomaly detection; intrusion detection; machine learning; AI-driven security; blockchain; edge computing; threat monitoring; data fusion; privacy-preserving techniques
(This special issue belongs to the Section Security Engineering & Applications)
Cyber Security and Digital Forensics—2nd Edition submission deadline 31 Oct 2025 | 8 articles | Viewed by 10250 | Submission Open
Keywords: information security; cybersecurity auditing; cybersecurity and information security compliance; cybersecurity governance and regulations; cyber situational awareness; digital forensics for cybersecurity; digital forensics incident response; digital forensics automation
(This special issue belongs to the Section Security Engineering & Applications)
Data Protection and Privacy
edited by , and Kyriakos Stefanidis
submission deadline 20 Nov 2025 | 7 articles | Viewed by 34393 | Submission Open
Keywords: cybersecurity and privacy in industrial environments; security in cyber– physical environments; cryptography in I4.0; security and privacy in industrial control systems; IoT security and privacy; IoT system and network security; privacy protection and privacy-by-design; blockchains and smart contracts for IoT; trust issues in intelligent IoT devices; IoT threat detection and risk management; incident response and vulnerability management in IoT infrastructures; IoT privacy protection; secure data management and trading in industrial environments; privacy-enhancing technologies for Ι ο Τ devices; IoT Identity management; artificial intelligence (AI)-based security; machine learning and data protection for I4.0; standardization activities for I4.0 security; quantum and post-quantum I4.0 cryptography; IoT side-channel attacks
(This special issue belongs to the Section Privacy)
Building Community of Good Practice in Cybersecurity
edited by , Hanan Hindy and Aunshul Rege
submission deadline 31 Dec 2025 | 4 articles | Viewed by 28545 | Submission Open
Keywords: cyber situational awareness; security in artificial intelligence and robotics; human factor cognition and security; security in blockchain technologies; STEM and cyber security education; social media; wearable; and web analytics security; cyber security; application container platform security; cyber incident response
(This special issue belongs to the Section Security Engineering & Applications)
Cloud Security and Privacy submission deadline 30 Jan 2026 | 4 articles | Viewed by 25839 | Submission Open
(This special issue belongs to the Section Privacy)
Applied Cryptography
edited by Yangguang Tian and
submission deadline 20 Feb 2026 | Viewed by 725 | Submission Open
Keywords: cryptography and cryptanalysis; applied cryptography; cryptography for iot and blockchains; cryptography for secure computing; cryptography for data protection; privacy-preserving technologies
(This special issue belongs to the Section Cryptography and Cryptology)
Intrusion/Malware Detection and Prevention in Networks—2nd Edition
edited by and
submission deadline 10 Mar 2026 | 1 articles | Viewed by 2595 | Submission Open
Keywords: distributed denial-of-service (DDoS) attack and defense; explainable prevention strategies; profiling normal or abnormal system behaviors; metrics for evaluating the effectiveness of intrusion detection techniques; access control; biometrics; jamming attack and defense; trojan attack and defense; viruses and malware; covert channel detection; malware and unwanted software
(This special issue belongs to the Section Security Engineering & Applications)
Back to TopTop