Cybersecurity and Data Science, Volume II

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (10 December 2023) | Viewed by 7014

Special Issue Editors

Institute of Telecommunications, Warsaw University of Technology, 00-665 Warszawa, Poland
Interests: cybersecurity; digital forensics; steganography; anomaly detection
Special Issues, Collections and Topics in MDPI journals
The Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warszawa, Poland
Interests: digital systems; digital image processing; digital signal processing; SoPC; FPGA

Special Issue Information

Dear Colleagues,

This Special Issue is devoted to promoting the latest research in cybersecurity and data science. Digital transformation turns data into the new oil. The increasing availability of big data, structured and unstructured datasets, raises new challenges in cybersecurity, efficient data processing and knowledge extraction. The field of cybersecurity and data science fuels the data-driven economy. Innovations in this field require strong foundations in mathematics, statistics, machine learning and information security. 

The unprecedented increase in the availability of data in many fields of science and technology (e.g., genomic data, data from industrial environments, sensory data of smart cities, and social network data) ask for new methods and solutions for data processing, information extraction and decision support. This stimulates the development of new methods of data analysis, including those adapted to the analysis of new data structures and the growing volume of data.

Prof. Dr. Krzysztof Szczypiorski
Prof. Dr. Mariusz Rawski
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity:
    • automated safety management systems
    • non-repudiation systems, including blockchain-based
    • data protection using machine learning
    • detection of unknown attacks on ICT systems using big data and fast data algorithms
    • post-quantum cryptography
  • BioMed data science:
    • bioinformatics
    • biostatistics
    • computational medicine
  • big and stream data science:
    • big data
    • distributed storage
    • batch and stream analytics (smart city, genomics)
  • advanced machine learning:
    • statistical learning methods
    • interpretable and explainable predictive models
    • clustering
    • classification and data fusion
  • mathematical foundations for data science:
    • mathematical foundations of data modeling and analysis
    • statistics and probability
    • graphs and networks
    • soft computing

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 3168 KiB  
Article
A Resource Allocation Scheme with the Best Revenue in the Computing Power Network
by Zuhao Wang, Yanhua Yu, Di Liu, Wenjing Li, Ao Xiong and Yu Song
Electronics 2023, 12(9), 1990; https://doi.org/10.3390/electronics12091990 - 25 Apr 2023
Viewed by 789
Abstract
The emergence of computing power networks has improved the flexibility of resource scheduling. Considering the current trading scenario of computing power and network resources, most resources are no longer subject to change after being allocated to users until the end of the lease. [...] Read more.
The emergence of computing power networks has improved the flexibility of resource scheduling. Considering the current trading scenario of computing power and network resources, most resources are no longer subject to change after being allocated to users until the end of the lease. However, this practice often leads to idle resources during resource usage. To optimize resource allocation, a trading mechanism is needed to encourage users to sell their idle resources. The Myerson auction mechanism precisely aims to maximize the seller’s benefits. Therefore, we propose a resource allocation scheme based on the Myerson auction. In the scenario of the same user bidding distribution, we first combine the Myerson auction with Hyperledger Fabric by introducing a reserved price, which creates conditions for the application of blockchain in auction scenarios. Regarding different user bidding distributions, we propose a Myerson auction network model based on clustering algorithms, which makes the auction adaptable to more complex scenarios. The experimental findings show that the revenue generated by the auction model in both scenarios is significantly higher than that of the traditional sealed bid second-price auction, and can approach the expected revenue in the real Myerson auction scenario. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science, Volume II)
Show Figures

Figure 1

23 pages, 5486 KiB  
Article
Building Security Awareness of Interdependent Services, Business Processes, and Systems in Cyberspace
by Marek Amanowicz and Mariusz Kamola
Electronics 2022, 11(22), 3835; https://doi.org/10.3390/electronics11223835 - 21 Nov 2022
Cited by 1 | Viewed by 1219
Abstract
Protection against a growing number of increasingly sophisticated and complex cyberattacks requires the real-time acquisition of up-to-date information on identified threats and their potential impact on an enterprise’s operation. However, the complexity and variety of IT/OT infrastructure interdependencies and the business processes and [...] Read more.
Protection against a growing number of increasingly sophisticated and complex cyberattacks requires the real-time acquisition of up-to-date information on identified threats and their potential impact on an enterprise’s operation. However, the complexity and variety of IT/OT infrastructure interdependencies and the business processes and services it supports significantly complicate this task. Hence, we propose a novel solution here that provides security awareness of critical infrastructure entities. Appropriate measures and methods for comprehensively managing cyberspace security and resilience in an enterprise are provided, and these take into account the aspects of confidentiality, availability, and integrity of the essential services offered across the underlying business processes and IT infrastructure. The abstraction of these entities as business objects is proposed to uniformly address them and their interdependencies. In this paper, the concept of modeling the cyberspace of interdependent services, business processes, and systems and the procedures for assessing and predicting their attributes and dynamic states are depicted. The enterprise can build a model of its operation with the proposed formalism, which takes it to the first level of security awareness. Through dedicated simulation procedures, the enterprise can anticipate the evolution of actual or hypothetical threats and related risks, which is the second level of awareness. Finally, simulation-driven analyses can serve in guiding operations toward improvement with respect to resilience and threat protection, bringing the enterprise to the third level of awareness. The solution is also applied in the case study of an essential service provider. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science, Volume II)
Show Figures

Figure 1

11 pages, 583 KiB  
Article
Siamese Neural Networks on the Trail of Similarity in Bugs in 5G Mobile Network Base Stations
by Sebastian Zarębski, Aleksander Kuzmich, Sebastian Sitko, Krzysztof Rusek and Piotr Chołda
Electronics 2022, 11(22), 3664; https://doi.org/10.3390/electronics11223664 - 09 Nov 2022
Viewed by 1071
Abstract
To improve the R&D process by reducing duplicated bug tickets, we used the idea of composing a BERT encoder as a Siamese network to create a system for finding similar existing tickets. We proposed several different methods of generating artificial ticket pairs to [...] Read more.
To improve the R&D process by reducing duplicated bug tickets, we used the idea of composing a BERT encoder as a Siamese network to create a system for finding similar existing tickets. We proposed several different methods of generating artificial ticket pairs to augment the training set. Two phases of training were conducted. The first showed that only approximately 9% of pairs were correctly identified as certainly similar. Only 48% of the test samples were found to be pairs of similar tickets. With fine-tuning, we improved that result to 81%, which is a number describing a set of common decisions between the engineer in the company and the solution presented. With this tool, engineers in the company receive a specialized instrument with the ability to evaluate tickets related to a security bug at a level close to an experienced company employee. Therefore, we propose a new engineering application in corporate practice in a very important area with Siamese network methods that are widely known and recognized for their efficiency. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science, Volume II)
Show Figures

Figure 1

32 pages, 668 KiB  
Article
A Survey on Moving Target Defense for Networks: A Practical View
by Łukasz Jalowski, Marek Zmuda and Mariusz Rawski
Electronics 2022, 11(18), 2886; https://doi.org/10.3390/electronics11182886 - 12 Sep 2022
Cited by 3 | Viewed by 3054
Abstract
The static nature of many of currently used network systems has multiple practical benefits, including cost optimization and ease of deployment, but it makes them vulnerable to attackers who can observe from the shadows to gain insight before launching a devastating attack against [...] Read more.
The static nature of many of currently used network systems has multiple practical benefits, including cost optimization and ease of deployment, but it makes them vulnerable to attackers who can observe from the shadows to gain insight before launching a devastating attack against the infrastructure. Moving target defense (MTD) is one of the emerging areas that promises to protect against this kind of attack by continuously shifting system parameters and changing the attack surface of protected systems. The emergence of network functions virtualization (NFV) and software-defined networking (SDN) technology allows for the implementation of very sophisticated MTD techniques. Furthermore, the introduction of such solutions as field-programmable gate array (FPGA) programmable acceleration cards makes it possible to take the MTD concept to the next level. Applying hardware acceleration to existing concepts or developing new, dedicated methods will offer more robust, efficient, and secure solutions. However, to the best of the authors’ knowledge, there are still no major implementations of MTD schemes inside large-scale networks. This survey aims to understand why, by analyzing research made in the field of MTD to show current pitfalls and possible improvements that need to be addressed in future proposals to make MTD a viable solution to address current cybersecurity threats in real-life scenarios. Full article
(This article belongs to the Special Issue Cybersecurity and Data Science, Volume II)
Show Figures

Figure 1

Back to TopTop