posted by organizer: monika1193 || 1358 views || tracked by 6 users: [display]

SI CAIDM 2024 : SPECIAL ISSUE on Cybersecurity applications for improving data management: trends and challenges


When N/A
Where N/A
Submission Deadline Nov 15, 2023
Categories    computer science   cybersecurity

Call For Papers

๐—ฆ๐—ฃ๐—˜๐—–๐—œ๐—”๐—Ÿ ๐—œ๐—ฆ๐—ฆ๐—จ๐—˜ ๐—ผ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฎ๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ถ๐—บ๐—ฝ๐—ฟ๐—ผ๐˜ƒ๐—ถ๐—ป๐—ด ๐—ฑ๐—ฎ๐˜๐—ฎ ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜: ๐˜๐—ฟ๐—ฒ๐—ป๐—ฑ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฐ๐—ต๐—ฎ๐—น๐—น๐—ฒ๐—ป๐—ด๐—ฒ๐˜€

This special issue in ๐—ข๐—ฝ๐—ฒ๐—ป ๐—–๐—ผ๐—บ๐—ฝ๐˜‚๐˜๐—ฒ๐—ฟ ๐—ฆ๐—ฐ๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ (๐—œ๐—™ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฎ: ๐Ÿญ.๐Ÿฑ) focuses on Cybersecurity applications for improving data management
Vulnerability concerns have grown due to incorporation of Information and Communication Technology (ICT) technologies into mechanical components used regularly in the travel industry. As the amount of integration rises, so do the inherent problems in the software applications that power these organizations. Additionally, as the business shift towards implementing automated aero planes and intelligent terminals picks up speed, these worries are growing much more important. An analysis of aerospace hacking attempts and assault interfaces over the past years reveals patterns and lessons that can be used to plan future approaches to safeguard the development of a crucial business. Advanced persistent threat groups that are working together with a specific government entertainer to grab intellectual assets and intellectual ability in hopes of improving their residential airframe functionality as well as supervising, easily penetrating, and undermining another nations functionality are demonstrated to be the biggest contenders to the economy, according to the facts offered. The Information Technology (IT) infrastructures are a part of civil aviation that is frequently assaulted, with hostile intrusion to gain unauthorized, proving to be the most attack patterns method. Potential cyber patterns have already been predicted by evaluating the variety of attack vectors and the national threat characteristics. The survey conclusions will assist in establishing and executing preventative measures to safeguard essential facilities from computer security, undermining consumer sentiment in a vital customer sector. The Internet of Things (IoT), a new technology, has completely changed how individuals, intelligence items, smart watches, data, and knowledge are connected globally. IoT innovation remains in its early stages, and numerous connected problems require being resolved. IoT is an all-encompassing idea of integrating anything. A significant increase in transparency, authenticity, availability, flexibility, security, and compatibility could be achieved in the country thanks to IoT. IoT security, unfortunately, is a hard process. IoT innovation is founded based on security systems. IoT vulnerability is methodically analyzed in this piece. The connection and safeguarding of various connected devices and modern informational communications are the primary concerns (ICT). Academics and professionals willing to engage in IoT cyberattacks will benefit from the Survey& data and conclusions. Important topics include current IoT internet security investigations, IoT cyberwarfare structures, and categorizations, important empowering preventive actions and methodologies, effective business implementations, and data analysis patterns and obstacles. Several academics and experts have recently discovered that modern communications systems and equipment are vulnerable to various cyberattacks. These cyberattacks damage and damage private corporations as well as governmental entities. In light of the preceding, we welcome academics to submit original research articles and review papers for the current Special Issue that will address the topic of Cybersecurity applications for enhancing data management: trends and difficulties.

Potential topics include but are not limited to the following:
โ€ข An overview of current and anticipated developments for cybersecurity in the transport sector.
โ€ข Overview of existing technologies, needs, issues, and patterns in using big data analytics for security.
โ€ข An overview of present study problems in the context of Internet of Things (IoT) protection.
โ€ข Social psychology and computers were attempting to learn about developments in security administration.
โ€ข Improvements in cybercrime judgement call for assistance in visualisation and data authenticity.
โ€ข Current products and future possibilities in machine learning and defence.
โ€ข Review the literature and upcoming advances in authorization techniques for big data management platforms.
โ€ข An analysis of vulnerability problems in significant industrial infrastructure.
โ€ข Big data implications and recent technologies in protection.
โ€ข Challenges and advancements in data security as these apply to a multitude of platforms and information management.
โ€ข Information security and forensic investigations are emerging problems for pervasive computing.
โ€ข The architecture uses and upcoming recent developments for a supervised learning architecture for security.

Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process.

๐‘ฎ๐‘ผ๐‘ฌ๐‘บ๐‘ป ๐‘ฌ๐‘ซ๐‘ฐ๐‘ป๐‘ถ๐‘น๐‘บ

Haris M. Khalid, University of Johannesburg, South Africa.
Taha Zoulagh, University of Santiago, Chile.
Mohammad Abuashour, Hashemite University, Jordan.


The deadline for submissions is ๐—ก๐—ข๐—ฉ๐—˜๐— ๐—•๐—˜๐—ฅ ๐Ÿญ๐Ÿฑ, ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ, but individual papers will be reviewed and published online on an ongoing basis.

๐‘ฏ๐‘ถ๐‘พ ๐‘ป๐‘ถ ๐‘บ๐‘ผ๐‘ฉ๐‘ด๐‘ฐ๐‘ป

All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager:


Please choose the article type โ€œ๐™Ž๐™„: ๐˜พ๐™ฎ๐™—๐™š๐™ง๐™จ๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™–๐™ฅ๐™ฅ๐™ก๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ๐™จ ๐™›๐™ค๐™ง ๐™ž๐™ข๐™ฅ๐™ง๐™ค๐™ซ๐™ž๐™ฃ๐™œ ๐™™๐™–๐™ฉ๐™– ๐™ข๐™–๐™ฃ๐™–๐™œ๐™š๐™ข๐™š๐™ฃ๐™ฉโ€.



๐—™๐—ผ๐—ฟ ๐—บ๐—ผ๐—ฟ๐—ฒ ๐—ถ๐—ป๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป, ๐—ฝ๐—น๐—ฒ๐—ฎ๐˜€๐—ฒ ๐˜ƒ๐—ถ๐˜€๐—ถ๐˜ ๐—ผ๐˜‚๐—ฟ ๐˜„๐—ฒ๐—ฏ๐˜€๐—ถ๐˜๐—ฒ.

Related Resources

GreeNet Symposium - SGNC 2024   15th Symposium on Green Networking and Computing (SGNC 2024)
BDCAT 2024   IEEE/ACM Intโ€™l Conf. on Big Data Computing, Applications, and Technologies
IEEE ICA 2022   The 6th IEEE International Conference on Agents
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
SPIE-Ei/Scopus-CVCM 2024   2024 5th International Conference on Computer Vision, Communications and Multimedia (CVCM 2024) -EI Compendex
ICONDATA 2024   6th International Conference on Data Science and Applications
SPIE-Ei/Scopus-ITNLP 2024   2024 4th International Conference on Information Technology and Natural Language Processing (ITNLP 2024) -EI Compendex
AASDS 2024   Special Issue on Applications and Analysis of Statistics and Data Science
ACDSA 2025   2nd International Conference on Artificial Intelligence, Computer, Data Sciences and Applications
Springer ISPR'2024   The 4'th International Conference on Intelligent Systems and Pattern Recognition