Special Issues

Journal of Cybersecurity and Privacy publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic and all Special Issue submissions follow MDPI's standard editorial process. The journal’s Editor-in-Chief and/or designated Editorial Board Member will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. Further information on MDPI's Special Issue polices and Guest Editor responsibilities can be found here. For any inquiries related to a Special Issue, please contact the Editorial Office.

Section
Search by Title/Keyword
 
Order results
Display
Results per page
Building Community of Good Practice in Cybersecurity
edited by , Pierangelo Rosati, Hanan Hindy and Aunshul Rege
submission deadline 25 Jan 2025 | 3 articles | Viewed by 10378 | Submission Open
Keywords: cyber situational awareness; security in artificial intelligence and robotics; human factor cognition and security; security in blockchain technologies; STEM and cyber security education; social media; wearable; and web analytics security; cyber security; application container platform security; cyber incident response
(This special issue belongs to the Section Security Engineering & Applications)
Cloud Security and Privacy submission deadline 31 Jan 2025 | 4 articles | Viewed by 15815 | Submission Open
(This special issue belongs to the Section Privacy)
Data Protection and Privacy
edited by Chrysostomos Stylios, and Kyriakos Stefanidis
submission deadline 20 Feb 2025 | 5 articles | Viewed by 13594 | Submission Open
Keywords: cybersecurity and privacy in industrial environments; security in cyber– physical environments; cryptography in I4.0; security and privacy in industrial control systems; IoT security and privacy; IoT system and network security; privacy protection and privacy-by-design; blockchains and smart contracts for IoT; trust issues in intelligent IoT devices; IoT threat detection and risk management; incident response and vulnerability management in IoT infrastructures; IoT privacy protection; secure data management and trading in industrial environments; privacy-enhancing technologies for Ι ο Τ devices; IoT Identity management; artificial intelligence (AI)-based security; machine learning and data protection for I4.0; standardization activities for I4.0 security; quantum and post-quantum I4.0 cryptography; IoT side-channel attacks
(This special issue belongs to the Section Privacy)
Applied Cryptography
edited by Yangguang Tian and
submission deadline 10 Mar 2025 | Viewed by 420 | Submission Open
Keywords: cryptography and cryptanalysis; applied cryptography; cryptography for iot and blockchains; cryptography for secure computing; cryptography for data protection; privacy-preserving technologies
(This special issue belongs to the Section Cryptography and Cryptology)
Cyber Security and Digital Forensics—2nd Edition submission deadline 30 May 2025 | 1 articles | Viewed by 1853 | Submission Open
Keywords: information security; cybersecurity auditing; cybersecurity and information security compliance; cybersecurity governance and regulations; cyber situational awareness; digital forensics for cybersecurity; digital forensics incident response; digital forensics automation
(This special issue belongs to the Section Security Engineering & Applications)
Intrusion/Malware Detection and Prevention in Networks—2nd Edition
edited by and
submission deadline 10 Jun 2025 | 1 articles | Viewed by 1598 | Submission Open
Keywords: distributed denial-of-service (DDoS) attack and defense; explainable prevention strategies; profiling normal or abnormal system behaviors; metrics for evaluating the effectiveness of intrusion detection techniques; access control; biometrics; jamming attack and defense; trojan attack and defense; viruses and malware; covert channel detection; malware and unwanted software
(This special issue belongs to the Section Security Engineering & Applications)
Security and Privacy of Intelligent Industrial Internet of Things submission deadline 20 Jun 2025 | Viewed by 609 | Submission Open
Keywords: intelligent industrial IoT training; artificial intelligence; edge computing; IoT innovative applications; IoT technologies
(This special issue belongs to the Section Security Engineering & Applications)
Cybersecurity Risk Prediction, Assessment and Management
edited by , Ibrahim Lazrig and
submission deadline 30 Jul 2025 | 3 articles | Viewed by 63730 | Submission Open
(This special issue belongs to the Section Security Engineering & Applications)
Cybersecurity in the Age of AI and IoT: Challenges and Innovations
edited by and
submission deadline 10 Aug 2025 | Viewed by 348 | Submission Open
Keywords: artificial intelligence (AI); internet of things (IoT); cybersecurity; AI-driven applications; threat modeling; risk assessment; intrusion detection; machine learning; privacy protection; data protection; financial markets security; government security strategies; emerging trends; secure AI applications; secure iot systems
(This special issue belongs to the Section Security Engineering & Applications)
Multimedia Security and Privacy
edited by
submission deadline 10 Oct 2025 | 1 articles | Viewed by 8205 | Submission Open
(This special issue belongs to the Section Security Engineering & Applications)
Back to TopTop