| |||||||||||
SI CAIDM 2024 : SPECIAL ISSUE on Cybersecurity applications for improving data management: trends and challenges | |||||||||||
Link: https://www.degruyter.com/journal/key/comp/html | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
๐ฆ๐ฃ๐๐๐๐๐ ๐๐ฆ๐ฆ๐จ๐ ๐ผ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป๐ ๐ณ๐ผ๐ฟ ๐ถ๐บ๐ฝ๐ฟ๐ผ๐๐ถ๐ป๐ด ๐ฑ๐ฎ๐๐ฎ ๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐: ๐๐ฟ๐ฒ๐ป๐ฑ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ต๐ฎ๐น๐น๐ฒ๐ป๐ด๐ฒ๐
This special issue in ๐ข๐ฝ๐ฒ๐ป ๐๐ผ๐บ๐ฝ๐๐๐ฒ๐ฟ ๐ฆ๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ (๐๐ ๐ฎ๐ฌ๐ฎ๐ฎ: ๐ญ.๐ฑ) focuses on Cybersecurity applications for improving data management Vulnerability concerns have grown due to incorporation of Information and Communication Technology (ICT) technologies into mechanical components used regularly in the travel industry. As the amount of integration rises, so do the inherent problems in the software applications that power these organizations. Additionally, as the business shift towards implementing automated aero planes and intelligent terminals picks up speed, these worries are growing much more important. An analysis of aerospace hacking attempts and assault interfaces over the past years reveals patterns and lessons that can be used to plan future approaches to safeguard the development of a crucial business. Advanced persistent threat groups that are working together with a specific government entertainer to grab intellectual assets and intellectual ability in hopes of improving their residential airframe functionality as well as supervising, easily penetrating, and undermining another nations functionality are demonstrated to be the biggest contenders to the economy, according to the facts offered. The Information Technology (IT) infrastructures are a part of civil aviation that is frequently assaulted, with hostile intrusion to gain unauthorized, proving to be the most attack patterns method. Potential cyber patterns have already been predicted by evaluating the variety of attack vectors and the national threat characteristics. The survey conclusions will assist in establishing and executing preventative measures to safeguard essential facilities from computer security, undermining consumer sentiment in a vital customer sector. The Internet of Things (IoT), a new technology, has completely changed how individuals, intelligence items, smart watches, data, and knowledge are connected globally. IoT innovation remains in its early stages, and numerous connected problems require being resolved. IoT is an all-encompassing idea of integrating anything. A significant increase in transparency, authenticity, availability, flexibility, security, and compatibility could be achieved in the country thanks to IoT. IoT security, unfortunately, is a hard process. IoT innovation is founded based on security systems. IoT vulnerability is methodically analyzed in this piece. The connection and safeguarding of various connected devices and modern informational communications are the primary concerns (ICT). Academics and professionals willing to engage in IoT cyberattacks will benefit from the Survey& data and conclusions. Important topics include current IoT internet security investigations, IoT cyberwarfare structures, and categorizations, important empowering preventive actions and methodologies, effective business implementations, and data analysis patterns and obstacles. Several academics and experts have recently discovered that modern communications systems and equipment are vulnerable to various cyberattacks. These cyberattacks damage and damage private corporations as well as governmental entities. In light of the preceding, we welcome academics to submit original research articles and review papers for the current Special Issue that will address the topic of Cybersecurity applications for enhancing data management: trends and difficulties. Potential topics include but are not limited to the following: โข An overview of current and anticipated developments for cybersecurity in the transport sector. โข Overview of existing technologies, needs, issues, and patterns in using big data analytics for security. โข An overview of present study problems in the context of Internet of Things (IoT) protection. โข Social psychology and computers were attempting to learn about developments in security administration. โข Improvements in cybercrime judgement call for assistance in visualisation and data authenticity. โข Current products and future possibilities in machine learning and defence. โข Review the literature and upcoming advances in authorization techniques for big data management platforms. โข An analysis of vulnerability problems in significant industrial infrastructure. โข Big data implications and recent technologies in protection. โข Challenges and advancements in data security as these apply to a multitude of platforms and information management. โข Information security and forensic investigations are emerging problems for pervasive computing. โข The architecture uses and upcoming recent developments for a supervised learning architecture for security. Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process. === ๐ฎ๐ผ๐ฌ๐บ๐ป ๐ฌ๐ซ๐ฐ๐ป๐ถ๐น๐บ Haris M. Khalid, University of Johannesburg, South Africa. Taha Zoulagh, University of Santiago, Chile. Mohammad Abuashour, Hashemite University, Jordan. === ๐ซ๐ฌ๐จ๐ซ๐ณ๐ฐ๐ต๐ฌ The deadline for submissions is ๐ก๐ข๐ฉ๐๐ ๐๐๐ฅ ๐ญ๐ฑ, ๐ฎ๐ฌ๐ฎ๐ฏ, but individual papers will be reviewed and published online on an ongoing basis. === ๐ฏ๐ถ๐พ ๐ป๐ถ ๐บ๐ผ๐ฉ๐ด๐ฐ๐ป All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager: ๐ต๐๐๐ฝ๐://๐๐๐.๐ฒ๐ฑ๐ถ๐๐ผ๐ฟ๐ถ๐ฎ๐น๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐ฟ.๐ฐ๐ผ๐บ/๐ผ๐ฝ๐ฒ๐ป๐ฐ๐/๐ฑ๐ฒ๐ณ๐ฎ๐๐น๐๐ฎ.๐ฎ๐๐ฝ๐ Please choose the article type โ๐๐: ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐ฅ๐ฅ๐ก๐๐๐๐ฉ๐๐ค๐ฃ๐จ ๐๐ค๐ง ๐๐ข๐ฅ๐ง๐ค๐ซ๐๐ฃ๐ ๐๐๐ฉ๐ ๐ข๐๐ฃ๐๐๐๐ข๐๐ฃ๐ฉโ. === ๐ช๐ถ๐ต๐ป๐จ๐ช๐ป ๐ผ๐ฝ๐ฒ๐ป๐ฐ๐ผ๐บ๐ฝ๐๐๐ฒ๐ฟ๐๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ@๐ฑ๐ฒ๐ด๐ฟ๐๐๐๐ฒ๐ฟ.๐ฐ๐ผ๐บ === ๐๐ผ๐ฟ ๐บ๐ผ๐ฟ๐ฒ ๐ถ๐ป๐ณ๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป, ๐ฝ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐๐ถ๐ ๐ผ๐๐ฟ ๐๐ฒ๐ฏ๐๐ถ๐๐ฒ. https://www.degruyter.com/journal/key/comp/html#overview |
|