Table of Content

Information Security Practice and Experience: Advances and Challenges

Submission Deadline: 31 December 2022 Submit to Special Issue

Guest Editors

Prof. Hu Xiong, University of Electronic Science and Technology of China, China
Prof. Kuo-Hui Yeh, National Dong Hwa University, Taiwan
Dr. Chunhua Su, the University of Aizu, Japan
Dr. Weizhi Meng, Technical University of Denmark, Denmark
Prof. Han-Chieh Chao, National Dong Hwa University, Taiwan


Advanced information and communication technologies, such as the Internet of Things (IoT), cyber-physical systems, edge computing, big data analytics, cognitive computing, machine learning and artificial intelligence, have enabled innovative engineering approaches to establish novel applications and services accomplishing needs of smart human life. Example application areas are such as healthcare, energy management, transportation, environmental protection, industrial systems monitoring and controlling, entertainment and smart communities which are expected to bring advances to improve our ways of living. However, it is quite challenging to model and realize the system design, transmission protocols, resource allocation, and management of system delay when integrating these heterogeneous information and communication technologies. Meanwhile, since many applications have connected IoT devices with corporate IT and vendor systems in data centers and the cloud, the pivoting risk of the hyperconnectivity of systems has been increased in terms of various security and privacy breaches.


Therefore, this special issue aims to compile recent research efforts dedicated to the study of information security practice and experience in the above advanced information and communication technologies to keep the applications safer and a better place of livelihood. This special issue solicits original and high quality works on recent advances empowering better security and privacy protection for advanced information and communication technologies. In addition, the excellent papers of ISPEC 2022 (The 17th International Conference on Information Security Practice and Experience, will be selected and considered for inclusion in this special issue. Note that each selected paper must be substantially extended, with at least 40% difference from its conference version. All submitted papers, including the extended manuscript from ISPEC 2022, will undergo the journal's standard peer-review process. 


Topics of interest include but are not limited to:

● Authentication, authorization and accountability

● Applied cryptography

● Blockchain

● Cyber security for smart transportation

● Database security 

● Digital forensics

● Intrusion detection 

● Web security

● Malware analysis and detection 

● Mobile security 

● Network security and privacy 

● Privacy enhanced technology

● Secure data sharing in cloud

● Security and privacy in edge computing 

● Security and privacy in IoT

● Security and privacy in ubiquitous computing

● Security for critical infrastructures

● Smart grid security

● Trust management

Share Link

WeChat scan