Trends and Prospects in Cybersecurity and Embedded Systems

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 July 2024 | Viewed by 100

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Software Engineering, RMIT University, Melbourne 3000, Australia
Interests: date privacy; privacy-preserving data mining; network security protocols; mobile and wireless communication security protocols; applied cryptography; e-commerce security; mobile agent security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue focuses on the evolving landscape of cybersecurity in relation to embedded systems. As the integration of embedded systems in critical sectors like healthcare, automotive, and industrial control systems increases, so does the complexity and sophistication of cybersecurity threats that target these systems. This issue covers recent advancements, challenges, and future directions in protecting embedded systems against cyber threats.

Key topics include, but are not limited to, the following:

  1. Advanced Threat Detection Techniques: Investigating cutting-edge methods for detecting and mitigating cyber threats specific to embedded systems, including AI and machine learning-based approaches.
  2. Embedded System Vulnerabilities: Exploring the unique vulnerabilities inherent to embedded systems, including hardware and software aspects, and strategies for their mitigation.
  3. Secure Design and Development: Uncovering the best practices, methodologies, and tools for the secure design and development of embedded systems.
  4. Case Studies and Real-World Applications: An analysis of real-world cybersecurity incidents involving embedded systems, lessons learned, and the strategies that can be implemented for future prevention.
  5. Regulatory and Standardization Efforts: Examining current and emerging regulations, standards, and frameworks guiding cybersecurity in embedded systems.
  6. Future Trends and Emerging Technologies: Insights into future challenges and opportunities in this field, including the impact of emerging technologies such as IoT and edge computing for cybersecurity in embedded systems.

This Special Issue aims to bring together researchers, practitioners, and industry experts to share their insights and latest findings. Contributions can range from theoretical research to practical case studies, providing a comprehensive view of the current state and future prospects of cybersecurity for embedded systems.

Prof. Dr. Xun Yi
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • embedded systems’ security
  • cyber threat detection
  • secure system design
  • cybersecurity regulations
  • IoT and edge computing vulnerabilities

Published Papers

This special issue is now open for submission.
Back to TopTop