George Drosatos
Researcher at ATHENA RC

SI: Advanced Technologies in Data and Information Security III

Special Issue on Advanced Technologies in Data and Information Security III, Applied Sciences

About this Special Issue

The protection of personal data and privacy is a timeless challenge which has intensified in the modern era. The digitisation that has been achieved in recent decades has radically changed the way we live, communicate and work, revealing various security and privacy issues. Specifically, the explosion of new technologies and the continuous developments of technologies, such as IoT and AI, have led to the increased value of data, while it has raised demand and introduced new ways to obtain it. Techniques such as data analysis and processing provide a set of powerful tools that can be used by both governments and businesses for specific purposes. However, as with any valuable resource, as in the case of data, the phenomena of abuse, unfair practices and even criminal acts are not absent. In particular, in recent years, there have been more and more cases of sophisticated cyberattacks, data theft and leaks or even data trade, which violate the rights of individuals, but also harm competition and seriously damage the reputation of businesses.

In this Special Issue, we seek research and case studies that demonstrate the application of advanced technologies in data and information security to support applied scientific research, in any area of science and technology. Example topics include (but are not limited to) the following:

  • Self-sovereign Identities
  • Privacy-Preserving Solutions
  • Blockchain-Based Security and Privacy
  • Data Loss Prevention
  • Deep Learning Forensics/Malware Analysis/Anomaly Detection
  • AI-driven Security Systems
  • Context-Aware Behavioural Analytics
  • Security and Data Breach Detection
  • Cyber-physical Systems Security
  • Secure and Privacy-Preserving Health Solutions
  • Active Defence Measures
  • Social Networks Information Leaks
  • Edge and Fog Computing Security
  • Anonymization and Pseudonymization Solutions
  • Zero-Trust Network Access Technology
  • Dynamic Risk Management
  • Cyber Threat Intelligence
  • Situational Awareness

The submission deadline for this Special Issue is 20 April 2024.

Guest Editors:

  • George Drosatos
    Institute for Language and Speech Processing, Athena Research Center, Greece
  • Konstantinos Rantos
    Department of Computer Science, International Hellenic University, Greece
  • Konstantinos Demertzis
    Department of Physics, International Hellenic University, Greece

This Special Issue is provided by the journal "Applied Sciences" and more details are available here.

Written by George Drosatos on Thursday May 4, 2023
Permalink - Category: Journals

« SI: Federated and Transfer Learning Applications - EICC 2024: European Interdisciplinary Cybersecurity Conference »