Submissions

Login or Register to make a submission.

Author Guidelines

Authors are invited to make a submission to this journal. All submissions will be assessed by an editor to determine whether they meet the aims and scope of this journal. Those considered to be a good fit will be sent for peer review before determining whether they will be accepted or rejected.

Before making a submission, authors are responsible for obtaining permission to publish any material included with the submission, such as photos, documents and datasets. All authors identified on the submission must consent to be identified as an author. Where appropriate, research should be approved by an appropriate ethics committee in accordance with the legal requirements of the study's country.

An editor may desk reject a submission if it does not meet minimum standards of quality. Before submitting, please ensure that the study design and research argument are structured and articulated properly. The title should be concise and the abstract should be able to stand on its own. This will increase the likelihood of reviewers agreeing to review the paper. When you're satisfied that your submission meets this standard, please follow the checklist below to prepare your submission.

Submission Preparation Checklist

All submissions must meet the following requirements.

  • This submission meets the requirements outlined in the Author Guidelines.
  • This submission has not been previously published, nor is it before another journal for consideration.
  • All references have been checked for accuracy and completeness.
  • All tables and figures have been numbered and labeled.
  • Permission has been obtained to publish all photos, datasets and other material provided with this submission.

Special Issue: Network and Information Security in Cyber Systems (Cybersecurity)

The world nations are already involved during more than the past two decades in disguised cyberwars in the 21st Century after the end of the Cold War a decade prior to the end of the 20th. However, even at a national and local level, the ubiquitous fraudulent practices from technological and currently unresolved complex legalistic viewpoints are not only disturbing but also quite alarming to have harmed and compromised uncountably many unprepared and uninformed end-users, enterprises, and innocent masses in terms of critical security and safety, and financial liabilities. The theoretical and applied advances in tackling and resolving this said colossal problem, and so to say, the-elephant-in-the-room, which is unfortunately and surprisingly progressing faster than the speed of tenable and reliable solutions, is a massive real and existing challenge for scientists and researchers due to lack of field data, absence of international cooperation due to politicization of this common enemy  and hidden privacy issues. For one striking example, In 2018, the United States was the country most severely affected by cybercrime in terms of financial damage: industry experts estimate that the U.S. government faced costs of over 13.7 billion U.S. dollars as a result of cyberattacks. For the fiscal year 2023, the U.S. government proposed 10.89 billion U.S. Dollar budget for cybersecurity to indicate how vehement and alarming the stakes are for national security.
Unpublished articles of internationally acceptable caliber are sought not only for identifying and assessing the risk regarding the problem-at-hand but concurrently for offering optimal and cost-conscious risk management or mitigation solutions feasibly and realistically. Articles of political and strategic content to harm, even inadvertently, individuals, enterprises and/or nations’ safety and cybersecurity interests will not be considered. Fictious and digitally simulated data may be allowed. Any cybersecurity data presented must comply with the IJCTE’s ground rules based on mutual consent from parties involved. This Special Issue is intended to improve scientific and academic/educational  stance to mitigate some of the unprecedented disasters and losses so as  to foster original brainstorming avenues, while the easier and compromised reverse action is to do nothing and expect the ransom-demanding pirates to grant pity on the unprepared silent majority, to cite a current reality. Time is ripe to say “no, thanks” and take notice, and act now.  

Keywords:

Quantitative-Qualitative-Hybrid, Risk Assessment, Cost-Conscious Risk  Management, Machine Learning, Artificial Intelligence, Deep Learning, Probabilistic and Deterministic Approaches, Cloud and Edge Computing, Cryptology  (Cryptography and Cryptanalysis), Blockchain, Cryptocurrencies, Neural Networks, Chaos Theory, Hacking and Ransoms, Outer Space Cybersecurity, Telecommunications,  Electrical Energy, Healthcare, Government, Physical and Digital Infrastructure, Agriculture and Food, Banking and Finance,  Hydroelectric, Coal-Powered and Nuclear Power Plants (Fossil), Solar, Wind-Powered (Renewable), Water Resources, National Defense and Industrial Base, Transportation, Internet, IoT,  Net Piracy, Naval (Maritime) and Aviation, Telemetry, Telemedicine, Sensor Systems, and others. 

Selected Papers from Conferences

This section will publish selected papers from conference.

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.