Submission Deadline: 31 May 2024 (closed) View: 409
As digital technologies and internet-connected systems become ubiquitous across public, private, and commercial spheres, new cybersecurity threats seem to emerge daily. Recent high-profile hacks and data breaches demonstrate the growing sophistication of malicious actors and the inability of conventional cyber defenses to keep pace. Clearly we need more innovative, proactive approaches to enhance digital security in the modern hyperconnected world. This requires moving beyond siloed disciplinary perspectives and leveraging insights across computing, social sciences, business, law, and humanities.
This special issue aims to catalyze fresh interdisciplinary collaborations and perspectives to strengthen the reliability, resilience, and trustworthiness of our digital ecosystems against misuse and attack. We seek to break down traditional academic barriers and synthesise diverse vantage points on bolstering cyber defenses while maintaining ethics, privacy, and human values. The latest advances in adversarial machine learning, decentralized blockchain architectures, risk modeling, behavioral psychology, and regulation all have important roles to play. By fostering creative cross-pollination between these fields, we hope to spur promising new directions for research and practice.
Possible topics for study submission and are not limited to those listed below.
1. Technical Approaches
(1) Artificial intelligence security applications
(2) Cross-model generative models and foundation models
(3) Copyright protection of Artificial Intelligence Generated Content (AIGC)
(4) Adversarial machine learning
(5) Production and Detection of AIGC
(6) Adversarial attacks in AIGC
(7) Privacy protection in AIGC
(8) Identity authentication in AIGC
(9) Digital forensics for AIGC
2. Deception technology
3. Social Engineering / Human Factor
(1) Behavioral Methods
(2) Human factors in cybersecurity (Phishing Attacks, Smishing, Vishing, Phishing etc)
(3) Usable security
(4) Social engineering defenses
4. Other Topics
(1) Game design and theory
(2) Privacy enhancing technologies Or theory
(3) Cybercrime deterrence and Policy