posted by user: drosatosgr || 5994 views || tracked by 14 users: [display]

SI on ATD&IS II 2023 : Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI

FacebookTwitterLinkedInGoogle

Link: https://www.mdpi.com/journal/applsci/special_issues/data_information_security_2022
 
When N/A
Where N/A
Submission Deadline Feb 20, 2023
Categories    privacy   security   cybersecurity   artificial intelligence
 

Call For Papers

Special Issue on Advanced Technologies in Data and Information Security II, Applied Sciences, MDPI

The protection of personal data and privacy is a timeless challenge which has intensified in the modern era. The digitisation that has been achieved in recent decades has radically changed the way we live, communicate and work, revealing various security and privacy issues. Specifically, the explosion of new technologies and the continuous developments of technologies, such as IoT and AI, have led to the increased value of data, while it has raised demand and introduced new ways to obtain it. Techniques such as data analysis and processing provide a set of powerful tools that can be used by both governments and businesses for specific purposes. However, as with any valuable resource, as in the case of data, the phenomena of abuse, unfair practices and even criminal acts are not absent. In particular, in recent years, there have been more and more cases of sophisticated cyberattacks, data theft and leaks or even data trade, which violate the rights of individuals, but also harm competition and seriously damage the reputation of businesses.

In this Special Issue, we seek research and case studies that demonstrate the application of advanced technologies in data and information security to support applied scientific research, in any area of science and technology. Example topics include (but are not limited to) the following:

- Self-sovereign Identities
- Privacy-Preserving Solutions
- Blockchain-Based Security and Privacy
- Data Loss Prevention
- Deep Learning Forensics/Malware Analysis/Anomaly Detection
- AI-driven Security Systems
- Context-Aware Behavioural Analytics
- Security and Data Breach Detection
- Cyber-physical Systems Security
- Secure and Privacy-Preserving Health Solutions
- Active Defence Measures
- Social Networks Information Leaks
- Edge and Fog Computing Security
- Anonymization and Pseudonymization Solutions
- Zero-Trust Network Access Technology
- Dynamic Risk Management
- Cyber Threat Intelligence
- Situational Awareness

The submission deadline for this Special Issue is 20 February 2023.

Guest Editors:

- George Drosatos, Institute for Language and Speech Processing, Athena Research Center, Greece (https://www.drosatos.info)
- Konstantinos Rantos, Department of Computer Science, International Hellenic University, Greece
- Konstantinos Demertzis, Department of Physics, International Hellenic University, Greece

This Special Issue is provided by the journal "Applied Sciences - MDPI" and more details are available here: https://www.mdpi.com/journal/applsci/special_issues/data_information_security_2022

Related Resources

ICTC--SCI 2025   2025 6th Information Communication Technologies Conference (ICTC 2025)--SCI
Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
Ei/Scopus-ACAI 2024   2024 7th International Conference on Algorithms, Computing and Artificial Intelligence(ACAI 2024)
AMLDS 2025   IEEE--2025 International Conference on Advanced Machine Learning and Data Science
IEEE BDAI 2025   IEEE--2025 the 8th International Conference on Big Data and Artificial Intelligence (BDAI 2025)
ICITA 2025   19th International Conference on Information Technology and Applications
Hong Kong-MIST 2025   2025 Asia-Pacific Conference on Marine Intelligent Systems and Technologies (MIST 2025)
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2