Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
applsci-logo

Journal Browser

Journal Browser

Advanced Cybersecurity Applications: Solutions to Counteract Cyber Threats

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 November 2024 | Viewed by 5342

Special Issue Editors

Special Issue Information

Dear Colleagues,

This Special Issue is dedicated to developments in cyber security from an interdisciplinary and multidisciplinary perspective, and focuses on the current and evolving challenges that are changing the landscape of threat. Establishing how  organizations,  governments and society can be better protected and withstand current and evolving cyber-attacks is of particular interest, in addition to intra-organizational and inter-organizational arrangements and how technology and human–technology interaction can enhance cyber security from a holistic perspective; this would benefit society and ensure that appropriate countermeasures are in place. We welcome a range of contributions and encourage researchers to submit their papers to this Special Issue for consideration. Indeed, we are eager to include empirical papers, practitioner-oriented papers, theoretical papers, review-oriented papers and conceptual papers, with an emphasis on linking theory with practice, and extending our knowledge of cyber security.

The areas to be addressed include:

Trustworthiness, software; cloud computing; vulnerabilities and solutions regarding artificial intelligence; the use of advanced biometrics; issues in blockchain technology; improving cyber security systems and networks; cyber security models; management policies and new business models; organizational relationships; governance and compliance; strategic intelligence; ethical hacking; the protection of critical national infrastructure and the protection of critical information infrastructure; smart cities; the consumer and privacy; counteracting fake news and disinformation; social media networks; online advertising; the Internet of Things; educational policy; the psychology of cyber-crime; ransomware; government policy; and digitalization.

Contributions to this Special Issue may draw upon a range of related bodies of knowledge, including business continuity management, crisis and emergency management, organizational resilience, and risk management. In addition, this Special Issue will be open to a range of authors, including scientists and social scientists.

Dr. Peter R. J. Trim
Dr. Yang-Im Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • artificial intelligence
  • computer networks
  • critical infrastructure
  • cyber security knowledge
  • education
  • frameworks
  • models
  • processes
  • the learning organization
  • security frameworks
  • social media networks
  • strategic intelligence
  • strategic threat detection
  • systems

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

22 pages, 2426 KiB  
Article
A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems
by Abdullah Alabdulatif and Navod Neranjan Thilakarathne
Appl. Sci. 2024, 14(20), 9567; https://doi.org/10.3390/app14209567 - 20 Oct 2024
Viewed by 413
Abstract
The fast proliferation of Internet of Things (IoT) devices has dramatically altered healthcare, increasing the efficiency and efficacy of smart health ecosystems. However, this expansion has created substantial security risks, as cybercriminals increasingly target IoT devices in order to exploit their weaknesses and [...] Read more.
The fast proliferation of Internet of Things (IoT) devices has dramatically altered healthcare, increasing the efficiency and efficacy of smart health ecosystems. However, this expansion has created substantial security risks, as cybercriminals increasingly target IoT devices in order to exploit their weaknesses and relay critical health information. The rising threat landscape poses serious concerns across various domains within healthcare, where the protection of patient information and the integrity of medical devices are paramount. Smart health systems, while offering numerous benefits, are particularly vulnerable to cyber-attacks due to the integration of IoT devices and the vast amounts of data they generate. Healthcare providers, although unable to control the actions of cyber adversaries, can take proactive steps to secure their systems by adopting robust cybersecurity measures, such as strong user authentication, regular system updates, and the implementation of advanced security technologies. This research introduces a groundbreaking approach to addressing the cybersecurity challenges in smart health ecosystems through the deployment of a novel cloud-enabled cyber threat-hunting platform. This platform leverages deception technology, which involves creating decoys, traps, and false information to divert cybercriminals away from legitimate health data and systems. By using this innovative approach, the platform assesses the cyber risks associated with smart health systems, offering actionable recommendations to healthcare stakeholders on how to minimize cyber risks and enhance the security posture of IoT-enabled healthcare solutions. Overall, this pioneering research represents a significant advancement in safeguarding the increasingly interconnected world of smart health ecosystems, providing a promising strategy for defending against the escalating cyber threats faced by the healthcare industry. Full article
Show Figures

Figure 1

20 pages, 2140 KiB  
Article
Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment
by Mishall Al-Zubaidie and Wid Alaa Jebbar
Appl. Sci. 2024, 14(14), 6361; https://doi.org/10.3390/app14146361 - 22 Jul 2024
Cited by 1 | Viewed by 963
Abstract
The days of long lines at banks and piles of paperwork are long gone. The lending landscape has been completely transformed by digital loans, which provide a quick, easy, and frequently paperless transactions. A payee can apply for a digital loan anytime, anywhere. [...] Read more.
The days of long lines at banks and piles of paperwork are long gone. The lending landscape has been completely transformed by digital loans, which provide a quick, easy, and frequently paperless transactions. A payee can apply for a digital loan anytime, anywhere. The entire lending procedure is accessible and efficient, but the availability of data on the Internet provides many risks and threats, where there are certain difficulties in the world of digital lending and data security, and privacy are major concerns. It is important to address the possibility of predatory lending practices that target weaker payees, especially with flash loans, which are considered a critical type of digital loan, as they add additional pressure to banks in terms of security because they return to the same block of the blockchain, and the possibility of tampering with them is considered great. Therefore, we have developed a security protocol based on the principle of digital cryptocurrency wallets: these digital wallets are protected by our use of the Xsalsa20 algorithm. It has high specifications and is enhanced with the usage of the Crow search algorithm, which guarantees fast and efficient search results. After the analysis of the proposed system in the Tamarin Prover tool, we obtained proof of a lot of security properties like data authenticity, perfect forward secrecy, and many others, which constitute the matter that gives our system the power of security. Also, we obtained 0.6667 ms. as the rate of processing speed, 2990 ms. as the time required by the proposed system to repay loans after the conditions are met, and, finally, our proposed system has the power to present a flexible property by creating 29,700 loans every 3 s; by this, we obtained a system that is secure, authentic, fast, and flexible. Full article
Show Figures

Figure 1

22 pages, 3675 KiB  
Article
Research on Power Cyber-Physical Cross-Domain Attack Paths Based on Graph Knowledge
by Shenjian Qiu, Zhipeng Shao, Jian Wang, Shiyou Xu and Jiaxuan Fei
Appl. Sci. 2024, 14(14), 6189; https://doi.org/10.3390/app14146189 - 16 Jul 2024
Viewed by 768
Abstract
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the [...] Read more.
Against the background of the construction of new power systems, power generation, transmission, distribution, and dispatching services are open to the outside world for interaction, and the accessibility of attack paths has been significantly enhanced. We are facing cyber-physical cross-domain attacks with the characteristics of strong targeting, high concealment, and cross-space threats. This paper proposes a quantitative analysis method for the influence of power cyber-physical cross-domain attack paths based on graph knowledge. First, a layered attack graph was constructed based on the cross-space and strong coupling characteristics of the power cyber-physical system business and the vertical architecture of network security protection focusing on border protection. The attack graph included cyber-physical cross-domain attacks, control master stations, measurement and control equipment failures, transient stable node disturbances, and other vertices, and achieved a comprehensive depiction of the attack path. Second, the out-degree, in-degree, vertex betweenness, etc., of each vertex in the attack graph were comprehensively considered to calculate the vertex vulnerability, and by defining the cyber-physical coupling degree and edge weights, the risk of each attack path was analyzed in detail. Finally, the IEEE RTS79 and RTS96 node systems were selected, and the impact of risk conduction on the cascading failures of the physical space system under typical attack paths was analyzed using examples, verifying the effectiveness of the proposed method. Full article
Show Figures

Figure 1

Review

Jump to: Research

33 pages, 17872 KiB  
Review
Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
by Sk Tahsin Hossain, Tan Yigitcanlar, Kien Nguyen and Yue Xu
Appl. Sci. 2024, 14(13), 5501; https://doi.org/10.3390/app14135501 - 25 Jun 2024
Viewed by 2195
Abstract
Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while maintaining data integrity and public trust. These responsibilities become even more critical as they transition into smart cities adopting advanced technological [...] Read more.
Local governments face critical challenges in the era of digital transformation, balancing the responsibility of safeguarding resident information and administrative documents while maintaining data integrity and public trust. These responsibilities become even more critical as they transition into smart cities adopting advanced technological innovations to revolutionize governance, enhance service delivery, and foster sustainable and resilient urban environments. Technological advancements like Internet-of-Things devices and artificial intelligence-driven approaches can provide better services to residents, but they also expose local governments to cyberthreats. There has been, nonetheless, very little study on cybersecurity issues from the local government perspective, and information on the multifaceted nature of cybersecurity in local government settings is scattered and fragmented, highlighting the need for a conceptual understanding and adequate action. Against this backdrop, this study aims to identify key components of cybersecurity in a local governmental context through a systematic literature review. This review further extends to the development of a conceptual framework providing a comprehensive understanding of the local government’s cybersecurity landscape. This study makes a significant contribution to the academic and professional domains of cybersecurity issues and policies within the local governmental context, offering valuable insights to local decision-makers, practitioners, and academics. This study also helps identify vulnerabilities, enabling stakeholders to recognize shortcomings in their cybersecurity and implement effective countermeasures to safeguard confidential information and documents. Thus, the findings inform local government policy to become more cybersecurity-aware and prepared. Full article
Show Figures

Figure 1

Back to TopTop