Special Issues
Table of Content

Emerging Technologies in Information Security

Submission Deadline: 31 January 2025 View: 805 Submit to Special Issue

Guest Editors

Dr Jawad Ahmad, Edinburgh Napier University, UK
Dr Mujeeb Ur Rehman, De Montfort University, UK
Dr Wadii Boulila, Prince Sultan University, Kingdom of Saudi Arabia

Summary

Information security is one of the fastest-growing and most diverse areas due to recent advancements in digital technologies and increasingly strict security and data protection regulations. As a result, public sector and private organizations have been compelled to take their cybersecurity seriously, implementing more robust measures and policies against cyber threats. To protect private and sensitive data, state-of-the-art encryption methods are available; however, previous schemes are either impractical or insecure. For example, the Advanced Encryption Standard (AES) is well-suited for text encryption, and lightweight solutions should be proposed for image encryption applications. Thus, there is a need for proposing lightweight image encryption schemes for real-time practical applications. Similarly, in other domains, researchers and organizations should come up with novel solutions that address the unique challenges and requirements to ensure information security is both effective and efficient. This special issue provides a valuable platform to showcase high-quality contributions to information security. The primary aim is to focus on all aspects of emerging technologies in information security to highlight future research directions. Therefore, we invite academics and industry professionals to submit original research articles and review articles that focus on exploring novel ideas in the area of information security.


Keywords

Data Privacy, Malware Analysis, Cloud Security, Intrusion Detection, Threat Intelligence, IoT Security, AI in Security, Biometric Security, Risk Assessment, Blockchain, Mobile Security, Multimedia Encryption

Published Papers


  • Open Access

    ARTICLE

    AI-Powered Image Security: Utilizing Autoencoders for Advanced Medical Image Encryption

    Fehaid Alqahtani
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1709-1724, 2024, DOI:10.32604/cmes.2024.054976
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract With the rapid advancement in artificial intelligence (AI) and its application in the Internet of Things (IoT), intelligent technologies are being introduced in the medical field, giving rise to smart healthcare systems. The medical imaging data contains sensitive information, which can easily be stolen or tampered with, necessitating secure encryption schemes designed specifically to protect these images. This paper introduces an artificial intelligence-driven novel encryption scheme tailored for the secure transmission and storage of high-resolution medical images. The proposed scheme utilizes an artificial intelligence-based autoencoder to compress high-resolution medical images and to facilitate fast encryption… More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood, Shahid Atiq, Intisar Ali Sajjad, Muhammad Majid Hussain, Malik M. Abdul Basit
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More >

    Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks

    Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, Muna Al-Razgan, Mahfoudh Saeed Al-Asaly, Taha Alfakih, Faisal Saeed
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 823-845, 2024, DOI:10.32604/cmes.2024.052112
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract The rapid growth of Internet of Things (IoT) devices has brought numerous benefits to the interconnected world. However, the ubiquitous nature of IoT networks exposes them to various security threats, including anomaly intrusion attacks. In addition, IoT devices generate a high volume of unstructured data. Traditional intrusion detection systems often struggle to cope with the unique characteristics of IoT networks, such as resource constraints and heterogeneous data sources. Given the unpredictable nature of network technologies and diverse intrusion methods, conventional machine-learning approaches seem to lack efficiency. Across numerous research domains, deep learning techniques have demonstrated… More >

  • Open Access

    ARTICLE

    Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain

    Zengxiang Li, Yongchong Wu, Alanoud Al Mazroa, Donghua Jiang, Jianhua Wu, Xishun Zhu
    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 847-869, 2024, DOI:10.32604/cmes.2024.051762
    (This article belongs to the Special Issue: Emerging Technologies in Information Security )
    Abstract Hidden capacity, concealment, security, and robustness are essential indicators of hiding algorithms. Currently, hiding algorithms tend to focus on algorithmic capacity, concealment, and security but often overlook the robustness of the algorithms. In practical applications, the container can suffer from damage caused by noise, cropping, and other attacks during transmission, resulting in challenging or even impossible complete recovery of the secret image. An image hiding algorithm based on dynamic region attention in the multi-scale wavelet domain is proposed to address this issue and enhance the robustness of hiding algorithms. In this proposed algorithm, a secret… More >

Share Link