Blockchain for Cybersecurity and Cyber-Risk Management

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Cryptography and Cryptology".

Deadline for manuscript submissions: 1 November 2026 | Viewed by 400

Special Issue Editors


E-Mail Website
Guest Editor
1. Cyber Security Research Centre, London Metropolitan University, London N7 8DB, UK
2. Cybersecurity Institute, University of Liverpool, Liverpool L69 3BX, UK
Interests: cyber security; digital forensics; Internet of Things; reinforcement learning; large language models; forensics; risk management and governance
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Computer Science and Technology, Northumbria University, Newcastle NE1 2SU, UK
Interests: cutting-edge fields of cybersecurity; artificial intelligence, and machine learning, particularly on topics such as cyber-security and privacy, federated learning, image processing and computational

E-Mail Website
Guest Editor
Department of Computer Science, The University of Jordan, Amman 11942, Jordan
Interests: cybersecurity; cyber-risk assessment; mobile apps

Special Issue Information

Dear Colleagues,

The primary aim of this Special Issue is to elevate the discourse surrounding cybersecurity by inspiring scientists to share their groundbreaking research and practical insights. Covering a wide array of topics, including blockchain, machine learning in security, artificial intelligence security, big data security and privacy, cloud security, and quantum security, it beckons academia, developers, policymakers, and cybersecurity analysts to contribute to the ongoing dialogue. By fostering collaboration and knowledge sharing, Risk Assessment and Countermeasures for Cybersecurity empowers readers not only to understand the nuances of modern cyber threats but also to actively participate in shaping the future of cybersecurity.

The interrelated topics of this Special Issue

Topic 1: Risk Assessment and Mitigation Strategies 

This topic will cover the principles, methods, and best practices involved in effective risk assessment and mitigation strategies. This chapter will focus on the cyber-risk management process and on how to employ various methods and tools to uncover cyber-risks across financial, operational, strategic, and compliance domains. In addition, the chapter will present the main proposed methods for identifying potential risks, analyzing and evaluating them to understand their likelihood and potential impact.  This involves assessing the probability of occurrence and the magnitude of consequences associated with each risk. 

Topic 2: Machine Intelligence Applications in Cyber-Risk Management 

Topic 2 explores the intersection of machine intelligence and cyber-risk management, highlighting the transformative impact of artificial intelligence (AI) and machine learning (ML) technologies in safeguarding against cyber threats. This chapter delves into various applications of machine intelligence in identifying, analyzing, and mitigating cyber risks, addressing the evolving landscape of cybersecurity threats faced by organizations globally. The core of the chapter focuses on exploring diverse applications of machine intelligence in cyber-risk management. This includes the use of AI and ML algorithms for real-time threat detection, anomaly detection, predictive analytics, and behavioral analysis. Additionally, machine intelligence technologies enable automated incident response, threat intelligence gathering, and adaptive security measures, empowering organizations to stay ahead of emerging cyber threats. 

Topic 3: Advanced Techniques for Network Security and Data Protection 

Topic 3 focuses on advanced techniques for enhancing network security and protecting sensitive data. This chapter explores innovative approaches and cutting-edge technologies designed to mitigate cybersecurity risks and safeguard organizational assets from evolving threats. The chapter emphasizes the critical importance of robust network security and data protection measures in safeguarding against cyber threats. It highlights the growing sophistication of cyberattacks and the need for organizations to adopt proactive strategies to defend their networks and sensitive data against unauthorized access, theft, and manipulation. The chapter discusses future directions in network security, such as the adoption of artificial intelligence, quantum-resistant encryption, and the proliferation of secure-by-design principles in network infrastructure development.

Topic 4: Blockchain for cyber-risk management 

Topic 4 discusses the innovative application of blockchain technology to cyber-risk management. This chapter explores how blockchain, originally developed as the underlying technology for cryptocurrencies, is being leveraged to address cybersecurity challenges, enhance data integrity, and strengthen risk management practices across industries. The chapter also addresses the challenges and considerations associated with implementing blockchain for cyber-risk management. These may include scalability limitations, interoperability issues, regulatory compliance, governance frameworks, and the need for robust cybersecurity measures to protect blockchain networks from cyber-attacks and vulnerabilities.

Dr. Mohamed Chahine Ghanem
Dr. Rejwan Bin Sulaiman
Dr. Mohammed Almaayah
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity risk assessment machine learning in security
  • artificial intelligence security
  • big data security and privacy
  • cloud security
  • digital and information forensics
  • quantum security
  • cyber–physical system security
  • network and mobile security
  • IoT security
  • security risk and engineering
  • management, policies, and human factors in security
  • privacy and cyber threat
  • anonymity and privacy
  • cryptography and cryptology
  • authentication and access control
  • biometrics
  • malware analysis
  • privacy-enhancing technologies and anonymity
  • IoT security
  • AI security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers

This special issue is now open for submission.
Back to TopTop