Modern Cybersecurity: Theory, Technologies and Applications

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 January 2024) | Viewed by 6149

Special Issue Editors

Department of Information Science and Technology, ISTAR_Iscte – Information Sciences, Technology and Architecture Research Center, Iscte - Instituto Universitário de Lisboa, 1649-026 Lisboa, Portugal
Interests: cybersecurity; information security; distributed web and mobile-based information systems and applications; digital assets intellectual property protection
Department of Information Science and Technology, ISTAR_Iscte – Information Sciences, Technology and Architecture Research Center, Iscte - Instituto Universitário de Lisboa, 1649-026 Lisboa, Portugal
Interests: cloud computing; adaptive platforms; service-oriented architectures; interoperability
Department of Computer Science and Information Technology, University of the District of Columbia, Washington, DC, USA
Interests: security; privacy; trust; IoT; smart transportation systems; cloud computing
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Organizations and individuals depend more and more on digital technologies to carry their mission and execute their processes. However, all these digital transforming initiatives (that include IoT, Blockchain and DLT, Cloud Computing and Storage, Big Data, Machine Learning, 5G/6G, and others) although coupled with larger advantages, create a serious number of threats that might originate attacks by unknown adversaries. It is, therefore, important to properly address these threats through integrated cybersecurity approaches that includes identification, protection, detection, response, and recovery capabilities. Cybersecurity combines people, processes, and technologies that are employed by organizations to protect its assets. It is the practice of protecting critical systems and sensitive information from digital threats. A strong cybersecurity strategy should contain layers of protection to defend against cyber-crimes, including cyber-attacks that try to access, modify, or destroy digital assets, extort financial resources from users or organizations, or those that aim to disrupt organization’s operations continuity. Cybersecurity should address multiple aspects, such as critical infrastructure security, network security, application security, cloud security, information security, user education and awareness, disaster recovery, and continuity planning.

The goal of this Special Issue is to highlight modern cybersecurity approaches and strategies that focus on theory, analysis, experiments, technologies or applications of any of the multiple aspects of cybersecurity (as highlighted before) in any of the relevant people/processes/technologies dimensions. Papers dealing with systematization of knowledge and survey papers are also welcome. Specific topics of interest include, but are not limited to:

  • Information Security;
  • Applied Cryptography;
  • Critical Infrastructure Security;
  • Security and Privacy;
  • Blockchain and Distributed Ledgers Security;
  • Multimedia Security;
  • Artificial Intelligence and Machine Learning Security;
  • Network and Hosts Security;
  • Identification, Authentication and Authorization Security;
  • Cybersecurity User Education and Awareness;
  • Cybersecurity Gamification;
  • Cloud, Edge, and Fog Computing Security;
  • Application Security;
  • Hardware Security;
  • Cyber Physical Systems Security;
  • Disaster Recovery and Business Continuity;
  • Mobile and IoT Security;
  • Cybersecurity Metrics and Assessment.

Dr. Carlos Serrao
Dr. Carlos Coutinho
Dr. Thabet Kacem
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity
  • information security
  • cryptography
  • network security
  • privacy
  • education
  • gamification
  • multimedia
  • cybersecurity awareness

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 1316 KiB  
Article
Risk-Management Framework and Information-Security Systems for Small and Medium Enterprises (SMEs): A Meta-Analysis Approach
by Khalifa AL-Dosari and Noora Fetais
Electronics 2023, 12(17), 3629; https://doi.org/10.3390/electronics12173629 - 28 Aug 2023
Cited by 1 | Viewed by 4396
Abstract
Information-technology (IT) security standards are regularly updated in a rapidly changing technological world to maintain pace with advanced technologies. This study was motivated by the realization that established IT risk-management frameworks might provide an adequate defence for small- and medium-sized enterprises (SMEs), especially [...] Read more.
Information-technology (IT) security standards are regularly updated in a rapidly changing technological world to maintain pace with advanced technologies. This study was motivated by the realization that established IT risk-management frameworks might provide an adequate defence for small- and medium-sized enterprises (SMEs), especially those actively adopting new technologies. We reviewed that a dynamic IT risk-management framework, updated to reflect emerging technological changes, would offer improved security and privacy for SMEs. To evaluate this, we conducted a systematic literature review spanning 2016 to 2021, focusing on IT risk-management research in various application areas. This study revealed that, while established frameworks like NIST have their benefits, they need to be better suited to the unique needs of SMEs due to their high degree of abstractness, vague guidelines, and lack of adaptability to technological advancements. The findings suggest a pressing need to evolve IT risk-management frameworks, particularly by incorporating advanced methods such as system dynamics, machine learning, and technoeconomic and sociotechnological models. These innovative approaches provide a more dynamic, responsive, and holistic approach to risk management, thereby significantly improving the IT security of SMEs. The study’s implications underscore the urgency of developing flexible, dynamic, and technology-informed IT risk-management strategies, offering novel insights into a more practical approach to IT risk management. Full article
(This article belongs to the Special Issue Modern Cybersecurity: Theory, Technologies and Applications)
Show Figures

Figure 1

20 pages, 395 KiB  
Article
Enhancing Performance and Security in the Metaverse: Latency Reduction Using Trust and Reputation Management
by Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren and Byung-Seo Kim
Electronics 2023, 12(15), 3362; https://doi.org/10.3390/electronics12153362 - 06 Aug 2023
Cited by 1 | Viewed by 1148
Abstract
In the rapidly evolving landscape of distributed systems, security stands as a significant challenge, especially in the face of network node attacks. Such threats introduce profound complexities into the dynamics of security protocols, trust management, and resource allocation, issues further amplified by the [...] Read more.
In the rapidly evolving landscape of distributed systems, security stands as a significant challenge, especially in the face of network node attacks. Such threats introduce profound complexities into the dynamics of security protocols, trust management, and resource allocation, issues further amplified by the metaverse’s exponential growth. This paper proposes an innovative solution, offering unique technical contributions to address these multi-faceted challenges. We unveil a trust-based resource allocation framework designed to facilitate the secure and efficient sharing of computational resources within the metaverse. This system has the potential to markedly diminish latency, thereby enhancing overall performance. In parallel, we introduce a reputation system that systematically monitors latency across a spectrum of metaverse entities, providing valuable insights for making informed resource allocation decisions. Moreover, we advocate for a decentralized trust management system, specifically designed to withstand potential security breaches without reliance on a centralized authority. This significantly fortifies both system security and user trust. Alongside this, we unveil an inventive proof-of-trust consensus mechanism that fosters trust and collaboration among metaverse entities during resource allocation, thereby cultivating a more secure ecosystem. Our proposed model poses a robust challenge to malicious entities, and it substantially bolsters the security architecture. The simulation results lend substantial credence to the effectiveness of our approach, demonstrating significant improvements in latency reduction, scalability, and the detection of malicious nodes, thereby outperforming existing methodologies. Full article
(This article belongs to the Special Issue Modern Cybersecurity: Theory, Technologies and Applications)
Show Figures

Figure 1

Back to TopTop