posted by organizer: monika1193 || 1836 views || tracked by 6 users: [display]

SI CAIDM 2024 : SPECIAL ISSUE on Cybersecurity applications for improving data management: trends and challenges

FacebookTwitterLinkedInGoogle

Link: https://www.degruyter.com/journal/key/comp/html
 
When N/A
Where N/A
Submission Deadline Nov 15, 2023
Categories    computer science   cybersecurity
 

Call For Papers

𝗦𝗣𝗘𝗖𝗜𝗔𝗟 𝗜𝗦𝗦𝗨𝗘 𝗼𝗻 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗮𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 𝗳𝗼𝗿 𝗶𝗺𝗽𝗿𝗼𝘃𝗶𝗻𝗴 𝗱𝗮𝘁𝗮 𝗺𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁: 𝘁𝗿𝗲𝗻𝗱𝘀 𝗮𝗻𝗱 𝗰𝗵𝗮𝗹𝗹𝗲𝗻𝗴𝗲𝘀


This special issue in 𝗢𝗽𝗲𝗻 𝗖𝗼𝗺𝗽𝘂𝘁𝗲𝗿 𝗦𝗰𝗶𝗲𝗻𝗰𝗲 (𝗜𝗙 𝟮𝟬𝟮𝟮: 𝟭.𝟱) focuses on Cybersecurity applications for improving data management
Vulnerability concerns have grown due to incorporation of Information and Communication Technology (ICT) technologies into mechanical components used regularly in the travel industry. As the amount of integration rises, so do the inherent problems in the software applications that power these organizations. Additionally, as the business shift towards implementing automated aero planes and intelligent terminals picks up speed, these worries are growing much more important. An analysis of aerospace hacking attempts and assault interfaces over the past years reveals patterns and lessons that can be used to plan future approaches to safeguard the development of a crucial business. Advanced persistent threat groups that are working together with a specific government entertainer to grab intellectual assets and intellectual ability in hopes of improving their residential airframe functionality as well as supervising, easily penetrating, and undermining another nations functionality are demonstrated to be the biggest contenders to the economy, according to the facts offered. The Information Technology (IT) infrastructures are a part of civil aviation that is frequently assaulted, with hostile intrusion to gain unauthorized, proving to be the most attack patterns method. Potential cyber patterns have already been predicted by evaluating the variety of attack vectors and the national threat characteristics. The survey conclusions will assist in establishing and executing preventative measures to safeguard essential facilities from computer security, undermining consumer sentiment in a vital customer sector. The Internet of Things (IoT), a new technology, has completely changed how individuals, intelligence items, smart watches, data, and knowledge are connected globally. IoT innovation remains in its early stages, and numerous connected problems require being resolved. IoT is an all-encompassing idea of integrating anything. A significant increase in transparency, authenticity, availability, flexibility, security, and compatibility could be achieved in the country thanks to IoT. IoT security, unfortunately, is a hard process. IoT innovation is founded based on security systems. IoT vulnerability is methodically analyzed in this piece. The connection and safeguarding of various connected devices and modern informational communications are the primary concerns (ICT). Academics and professionals willing to engage in IoT cyberattacks will benefit from the Survey& data and conclusions. Important topics include current IoT internet security investigations, IoT cyberwarfare structures, and categorizations, important empowering preventive actions and methodologies, effective business implementations, and data analysis patterns and obstacles. Several academics and experts have recently discovered that modern communications systems and equipment are vulnerable to various cyberattacks. These cyberattacks damage and damage private corporations as well as governmental entities. In light of the preceding, we welcome academics to submit original research articles and review papers for the current Special Issue that will address the topic of Cybersecurity applications for enhancing data management: trends and difficulties.

Potential topics include but are not limited to the following:
• An overview of current and anticipated developments for cybersecurity in the transport sector.
• Overview of existing technologies, needs, issues, and patterns in using big data analytics for security.
• An overview of present study problems in the context of Internet of Things (IoT) protection.
• Social psychology and computers were attempting to learn about developments in security administration.
• Improvements in cybercrime judgement call for assistance in visualisation and data authenticity.
• Current products and future possibilities in machine learning and defence.
• Review the literature and upcoming advances in authorization techniques for big data management platforms.
• An analysis of vulnerability problems in significant industrial infrastructure.
• Big data implications and recent technologies in protection.
• Challenges and advancements in data security as these apply to a multitude of platforms and information management.
• Information security and forensic investigations are emerging problems for pervasive computing.
• The architecture uses and upcoming recent developments for a supervised learning architecture for security.


Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process.

===
𝑮𝑼𝑬𝑺𝑻 𝑬𝑫𝑰𝑻𝑶𝑹𝑺

Haris M. Khalid, University of Johannesburg, South Africa.
Taha Zoulagh, University of Santiago, Chile.
Mohammad Abuashour, Hashemite University, Jordan.

===
𝑫𝑬𝑨𝑫𝑳𝑰𝑵𝑬

The deadline for submissions is 𝗡𝗢𝗩𝗘𝗠𝗕𝗘𝗥 𝟭𝟱, 𝟮𝟬𝟮𝟯, but individual papers will be reviewed and published online on an ongoing basis.

===
𝑯𝑶𝑾 𝑻𝑶 𝑺𝑼𝑩𝑴𝑰𝑻

All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager:

𝗵𝘁𝘁𝗽𝘀://𝘄𝘄𝘄.𝗲𝗱𝗶𝘁𝗼𝗿𝗶𝗮𝗹𝗺𝗮𝗻𝗮𝗴𝗲𝗿.𝗰𝗼𝗺/𝗼𝗽𝗲𝗻𝗰𝘀/𝗱𝗲𝗳𝗮𝘂𝗹𝘁𝟮.𝗮𝘀𝗽𝘅

Please choose the article type “𝙎𝙄: 𝘾𝙮𝙗𝙚𝙧𝙨𝙚𝙘𝙪𝙧𝙞𝙩𝙮 𝙖𝙥𝙥𝙡𝙞𝙘𝙖𝙩𝙞𝙤𝙣𝙨 𝙛𝙤𝙧 𝙞𝙢𝙥𝙧𝙤𝙫𝙞𝙣𝙜 𝙙𝙖𝙩𝙖 𝙢𝙖𝙣𝙖𝙜𝙚𝙢𝙚𝙣𝙩”.

===
𝑪𝑶𝑵𝑻𝑨𝑪𝑻

𝗼𝗽𝗲𝗻𝗰𝗼𝗺𝗽𝘂𝘁𝗲𝗿𝘀𝗰𝗶𝗲𝗻𝗰𝗲@𝗱𝗲𝗴𝗿𝘂𝘆𝘁𝗲𝗿.𝗰𝗼𝗺

===
𝗙𝗼𝗿 𝗺𝗼𝗿𝗲 𝗶𝗻𝗳𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻, 𝗽𝗹𝗲𝗮𝘀𝗲 𝘃𝗶𝘀𝗶𝘁 𝗼𝘂𝗿 𝘄𝗲𝗯𝘀𝗶𝘁𝗲.

https://www.degruyter.com/journal/key/comp/html#overview

Related Resources

ICITA 2025   19th International Conference on Information Technology and Applications
IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
CSITEC 2025   11th International Conference on Computer Science, Information Technology
CETA--EI 2025   2025 4th International Conference on Computer Engineering, Technologies and Applications (CETA 2025)
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
IEEE CACML 2025   2025 4th Asia Conference on Algorithms, Computing and Machine Learning (CACML 2025)
SEAS 2025   14th International Conference on Software Engineering and Applications