Submissions
Submission Preparation Checklist
All submissions must meet the following requirements.
- This submission meets the requirements outlined in the Author Guidelines.
- This submission has not been previously published, nor is it before another journal for consideration.
- All references have been checked for accuracy and completeness.
- All tables and figures have been numbered and labeled.
- Permission has been obtained to publish all photos, datasets and other material provided with this submission.
Topic 1: Cybersecurity and Privacy Engineering
- Secure Multi-Party Computation and Federated Learning
- Cryptographic Protocols
- Intrusion Detection Systems Using Deep Learning
- Identity and Access Management
- Privacy-Preserving Data Mining Techniques
Topic 2: Artificial Intelligence and Machine Learning Applications
- Edge AI for Real-Time Decision Making
- Explainable AI in Safety-Critical Systems
- Reinforcement Learning in Industrial Automation
- Neural Network Compression for Embedded Systems
- AI-Driven Predictive Maintenance in Manufacturing
Topic 3: Wireless Sensor Networks and IoT Systems
Wireless sensor networks and the Internet of Things form the backbone of smart environments, from smart cities to industrial monitoring. This collection addresses key challenges in energy efficiency, security, communication protocols, and real-time analytics. We encourage submissions that propose novel routing, fusion, and low-power solutions.
- Energy-Efficient Routing Protocols in WSNs
- Security Frameworks for IoT Devices
- Sensor Fusion Algorithms for Smart Environments
- Low-Power Communication Protocols for IoT
- Real-Time Data Analytics in Distributed Sensor Networks
Topic 4: Computational Intelligence and Optimization
Complex real-world problems often defy traditional analytical solutions. Computational intelligence—including swarm intelligence, fuzzy logic, evolutionary algorithms, and bio-inspired models—offers powerful adaptive and heuristic approaches. This collection welcomes innovative studies that develop or apply these methods to network optimization, autonomous control, and hybrid intelligent systems.
- Swarm Intelligence for Network Optimization
- Fuzzy Logic Controllers in Autonomous Systems
- Evolutionary Algorithms for Complex Problem Solving
- Hybrid Intelligent Systems Combining AI and Heuristics
- Bio-Inspired Computing Models for Adaptive Systems
Selected Papers from Conferences
This section will publish selected papers from conference.
Special Issue: Network and Information Security in Cyber Systems (Cybersecurity)
Keywords:
Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.