New Challenges in Cyber Security and Privacy

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: closed (20 August 2023) | Viewed by 1268

Special Issue Editors

College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Interests: computational intelligence; embedded systems; mobile edge computing; Internet of Things
1. Higher Polytechnic School, European Atlantic University, 39011 Santander, Spain
2. Department of Engineering, Iberoamerican International University, Arecibo, PR 00613, USA
Interests: ai; academic loafing; data preprocessing; education ecosystem; higher education; intelligent modal
Special Issues, Collections and Topics in MDPI journals
College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
Interests: secure software development; cyber security; data mining; IoT analytics
Computer and Embedded Systems Laboratory, Sfax University, Sfax 3029, Tunisia
Interests: wireless sensor networks; IoT security; cyber security; blockchain; multi-robot system coordination; internet of drone
Special Issues, Collections and Topics in MDPI journals
Department of Computer Science, University of British Columbia, Vancouver, BC V6T 1Z4, Canada
Interests: advanced adaptivity and personalization; collaborative recommendation and personalized web based learning systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The current society is characterized by the high interconnectivity of people, devices, and systems through the use of Internet of Things devices, smart city-enabling technologies, social media services, intelligent and autonomous systems, etc. With this connectivity, many day-to-day tasks have become more accessible and easier, contrasted by the increased number of threats to one's security, and privacy. In this Special Issue, we provide a platform for authors to present state-of-the-art research, innovations, and technologies on new challenges in cyber security and privacy. Authors are invited to submit manuscripts on the following topics:

  • Security challenges in cloud, edge and fog applications and services;
  • Security challenges in distributed systems and platforms;
  • Security challenges in the Internet of Things applications;
  • Machine learning models for security and privacy;
  • Security challenges in federated learning;
  • Security in vehicular communications;
  • Security and privacy in healthcare systems;
  • Security and privacy in social networks;
  • Security and privacy in cyber-physical systems;
  • Security and privacy in online learning platforms.

Dr. Basit Qureshi
Dr. Aman Singh
Dr. Yasir Javed
Dr. Omar Cheikhrouhou
Dr. Hazra Imran
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • encryption
  • blockchain
  • authentication
  • spoofing
  • botnet
  • intrusion detection systems
  • pen testing

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 9959 KiB  
Article
The Development of a Secure Online System to Protect Social Networking Platforms from Security Attacks
by Basil Alothman, Omar Alibrahim, Nourah Alenezi, Abrar Alhashemi, Maryam Alhashemi, Dalal Almardasi, Omar Khattab, Chibli Joumaa and Murad Khan
Appl. Sci. 2023, 13(21), 11731; https://doi.org/10.3390/app132111731 - 26 Oct 2023
Viewed by 680
Abstract
Due to the rapid advancement of social media, a huge amount of data is generated daily. Due to this great spread and expansion of the data at the social or professional level, the risks of securing the information become a challenging job. In [...] Read more.
Due to the rapid advancement of social media, a huge amount of data is generated daily. Due to this great spread and expansion of the data at the social or professional level, the risks of securing the information become a challenging job. In this regard, we conducted an in-depth interview to gather specific information about how infected users may be provided with information about recovering their hacked social networking accounts. Further, we have introduced a complete solution to help social network users to improve the idea of using different applications from one appropriate platform. In order to build this secure platform for accessing the security applications such as bank accounts, etc., we set various security methods to access social network websites, such as sending an OTP to their respective mobile devices, email or by fingerprint. Further, we also added a camera to identify the wrong or fake registration process of an intruder. The camera captures an image of the intruder registering to a social network website using the legitimate user’s information. In addition, the application also has a solution for forgetting the password or security questions that are sent to the user via email. Finally, the application saves the password, which can be recovered when the user forgets it. Full article
(This article belongs to the Special Issue New Challenges in Cyber Security and Privacy)
Show Figures

Figure 1

Back to TopTop