- 充值
- 会员
- 职称材料
文献信息
Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions. Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered.
Machine LearningIntrusion Detection SystemsDeep Learningthe Internet of ThingsIntrusion DetectionIntrusion Detection SystemNetwork SecurityAnomaly DetectionInternet of ThingsInformation SecurityIOT DevicesConvolutional Neural NetworkInformation ManagementSecurity FrameworkLong Short-Term MemoryWireless Sensor NetworksHybrid Deep Learning ModelUnauthorized AccessFeature SelectionCybersecurity
vol.16 (2025)
vol.15 (2025)
vol.14 (2024)
vol.13 (2024)
vol.12 (2023)
vol.11 (2023)
vol.10 (2022)
vol.9 (2022)