Special Issues

Network publishes Special Issues to create collections of papers on specific topics, with the aim of building a community of authors and readers to discuss the latest research and develop new ideas and research directions. Special Issues are led by Guest Editors, who are experts on the topic. The journal’s Editor-in-Chief and/or designated EBM will oversee Guest Editor appointments and Special Issue proposals, checking their content for relevance and ensuring the suitability of the material for the journal. The papers published in a Special Issue will be collected and displayed on a dedicated page of the journal’s website. For any inquiries related to a Special Issue, please contact the Editorial Office.

Search by Title/Keyword
 
Order results
Display
Results per page
Innovative Mobile Computing, Communication, and Sensing Systems
edited by and
submission deadline 30 Apr 2024 | 2 articles | Viewed by 2517 | Submission Open
Next Generation Networks and Systems Security submission deadline 31 Jul 2024 | 1 articles | Viewed by 1295 | Submission Open
Keywords: artificial intelligence; machine learning; deep learning; big data analysis; blockchain; cloud computing; cryptography; Internet of Things; intrusion detection; privacy; personal data protection; smart networks; 5G networks; Wi-Fi; IEEE 802.11 family of standards
Networking Technologies for Cyber-Physical Systems
edited by
submission deadline 30 Sep 2024 | 2 articles | Viewed by 7868 | Submission Open
Keywords: cyber-physical systems; Internet of Things; edge computing; sensor networks
Trustworthy Networking
edited by
submission deadline 30 Sep 2024 | 1 articles | Viewed by 1058 | Submission Open
Keywords: trust; security; privacy; multi-agent system; social learning
Artificial Intelligence in Effective Intrusion Detection for Clouds
edited by
submission deadline 31 Dec 2024 | Viewed by 39 | Submission Open
Keywords: artificial intelligence; intrusion detection; cloud computing; machine learning; deep learning; cybersecurity; network security; threat detection
Back to TopTop