Challenges and Remedies of IR4 Network Security

A special issue of Network (ISSN 2673-8732).

Deadline for manuscript submissions: closed (30 June 2023) | Viewed by 260

Special Issue Editors


E-Mail Website
Guest Editor
Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL, USA
Interests: distributed sensor networks; distributed systems; cyber security; artificial intelligence; computational biology

E-Mail Website
Guest Editor
Knight Foundation School of Computing and Information Sciences, Florida International University, Miami, FL, USA
Interests: cloud-based storage systems; cyber security; artificial intelligence; quantum networks; quantum key distribution; quantum communication; network forensics

Special Issue Information

Dear Colleagues,

Security is never-ending, and the rule regarding its implementation is considered to be “trust no one”. Specifically, it is of utmost importance that the internet be secured using advanced networking system (ANS) protection procedures that help to revolutionize technology and computing systems. The age of artificial intelligence is a pathway paved with the aim of isolating legacy threat detection with the new “prediction” technique. Henceforth, let us ponder the innovation of next-generation strong network systems that can discover threats in advance, with the aim of protecting the world’s security. AINETSEC aims to conceive a Special Issue highlighting the methods by which networking systems can be used as a digital threat countermeasure. Topics include, but are not limited to, the following: 

  1. AI-powered network spike detection: learning models that can sense network threats in advance;
  2. Reinforced network security: machine-learned self-constructing network systems;
  3. Next-generation sense systems: learn, predict and act out characteristics and behavior of network threats;
  4. Case studies on network traffic-based threat effectiveness and countermeasures using AI/ML techniques;
  5. Network tampering and tamper resistance;
  6. Creating AI-based network systems to pathway the quantum network;
  7. Reverse engineering and countermeasures for network threats;
  8. Creating secured network integrations with higher level software, firmware and microarchitectures.

Prof. Dr. Sundararaja Sitharama Iyengar
Dr. K. J. Latesh Kumar
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Network is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum networks
  • network spike
  • network forensics
  • network tampering
  • network traffic
  • self-sustaining networks
  • AI-powered networks
  • resistant networks
  • next-generation network systems

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop