Submissions

Login or Register to make a submission.

Author Guidelines

Authors are invited to make a submission to this journal. All submissions will be assessed by an editor to determine whether they meet the aims and scope of this journal. Those considered to be a good fit will be sent for peer review before determining whether they will be accepted or rejected.

Before making a submission, authors are responsible for obtaining permission to publish any material included with the submission, such as photos, documents and datasets. All authors identified on the submission must consent to be identified as an author. Where appropriate, research should be approved by an appropriate ethics committee in accordance with the legal requirements of the study's country.

An editor may desk reject a submission if it does not meet minimum standards of quality. Before submitting, please ensure that the study design and research argument are structured and articulated properly. The title should be concise and the abstract should be able to stand on its own. This will increase the likelihood of reviewers agreeing to review the paper. When you're satisfied that your submission meets this standard, please follow the checklist below to prepare your submission.

Submission Preparation Checklist

All submissions must meet the following requirements.

  • This submission meets the requirements outlined in the Author Guidelines.
  • This submission has not been previously published, nor is it before another journal for consideration.
  • All references have been checked for accuracy and completeness.
  • All tables and figures have been numbered and labeled.
  • Permission has been obtained to publish all photos, datasets and other material provided with this submission.

Topic 1: Cybersecurity and Privacy Engineering

The rapid digital transformation has brought unprecedented challenges in securing data, communications, and identities. This Topic Collection focuses on cutting-edge techniques for protecting information and systems against evolving threats. We invite contributions that present novel cryptographic protocols, privacy-preserving methods, and intelligent intrusion detection systems.
 
List of topics (including but not limited to):
  • Secure Multi-Party Computation and Federated Learning
  • Cryptographic Protocols
  • Intrusion Detection Systems Using Deep Learning
  • Identity and Access Management
  • Privacy-Preserving Data Mining Techniques

Topic 2: Artificial Intelligence and Machine Learning Applications

Artificial intelligence and machine learning are reshaping industries from manufacturing to autonomous systems. This collection highlights transformative AI/ML research with practical impact. We seek papers on real-time edge intelligence, explainable models for critical applications, reinforcement learning in industrial settings, and efficient neural network implementations.
 
List of topics (including but not limited to):
  • Edge AI for Real-Time Decision Making
  • Explainable AI in Safety-Critical Systems
  • Reinforcement Learning in Industrial Automation
  • Neural Network Compression for Embedded Systems
  • AI-Driven Predictive Maintenance in Manufacturing

Topic 3: Wireless Sensor Networks and IoT Systems

Wireless sensor networks and the Internet of Things form the backbone of smart environments, from smart cities to industrial monitoring. This collection addresses key challenges in energy efficiency, security, communication protocols, and real-time analytics. We encourage submissions that propose novel routing, fusion, and low-power solutions.

 
List of topics (including but not limited to):
  • Energy-Efficient Routing Protocols in WSNs
  • Security Frameworks for IoT Devices
  • Sensor Fusion Algorithms for Smart Environments
  • Low-Power Communication Protocols for IoT
  • Real-Time Data Analytics in Distributed Sensor Networks

Topic 4: Computational Intelligence and Optimization

Complex real-world problems often defy traditional analytical solutions. Computational intelligence—including swarm intelligence, fuzzy logic, evolutionary algorithms, and bio-inspired models—offers powerful adaptive and heuristic approaches. This collection welcomes innovative studies that develop or apply these methods to network optimization, autonomous control, and hybrid intelligent systems.

 
List of topics (including but not limited to):
  • Swarm Intelligence for Network Optimization
  • Fuzzy Logic Controllers in Autonomous Systems
  • Evolutionary Algorithms for Complex Problem Solving
  • Hybrid Intelligent Systems Combining AI and Heuristics
  • Bio-Inspired Computing Models for Adaptive Systems

Selected Papers from Conferences

This section will publish selected papers from conference.

Special Issue: Network and Information Security in Cyber Systems (Cybersecurity)

The world nations are already involved during more than the past two decades in disguised cyberwars in the 21st Century after the end of the Cold War a decade prior to the end of the 20th. However, even at a national and local level, the ubiquitous fraudulent practices from technological and currently unresolved complex legalistic viewpoints are not only disturbing but also quite alarming to have harmed and compromised uncountably many unprepared and uninformed end-users, enterprises, and innocent masses in terms of critical security and safety, and financial liabilities. The theoretical and applied advances in tackling and resolving this said colossal problem, and so to say, the-elephant-in-the-room, which is unfortunately and surprisingly progressing faster than the speed of tenable and reliable solutions, is a massive real and existing challenge for scientists and researchers due to lack of field data, absence of international cooperation due to politicization of this common enemy  and hidden privacy issues. For one striking example, In 2018, the United States was the country most severely affected by cybercrime in terms of financial damage: industry experts estimate that the U.S. government faced costs of over 13.7 billion U.S. dollars as a result of cyberattacks. For the fiscal year 2023, the U.S. government proposed 10.89 billion U.S. Dollar budget for cybersecurity to indicate how vehement and alarming the stakes are for national security.
Unpublished articles of internationally acceptable caliber are sought not only for identifying and assessing the risk regarding the problem-at-hand but concurrently for offering optimal and cost-conscious risk management or mitigation solutions feasibly and realistically. Articles of political and strategic content to harm, even inadvertently, individuals, enterprises and/or nations’ safety and cybersecurity interests will not be considered. Fictious and digitally simulated data may be allowed. Any cybersecurity data presented must comply with the IJCTE’s ground rules based on mutual consent from parties involved. This Special Issue is intended to improve scientific and academic/educational  stance to mitigate some of the unprecedented disasters and losses so as  to foster original brainstorming avenues, while the easier and compromised reverse action is to do nothing and expect the ransom-demanding pirates to grant pity on the unprepared silent majority, to cite a current reality. Time is ripe to say “no, thanks” and take notice, and act now.  

Keywords:

Quantitative-Qualitative-Hybrid, Risk Assessment, Cost-Conscious Risk  Management, Machine Learning, Artificial Intelligence, Deep Learning, Probabilistic and Deterministic Approaches, Cloud and Edge Computing, Cryptology  (Cryptography and Cryptanalysis), Blockchain, Cryptocurrencies, Neural Networks, Chaos Theory, Hacking and Ransoms, Outer Space Cybersecurity, Telecommunications,  Electrical Energy, Healthcare, Government, Physical and Digital Infrastructure, Agriculture and Food, Banking and Finance,  Hydroelectric, Coal-Powered and Nuclear Power Plants (Fossil), Solar, Wind-Powered (Renewable), Water Resources, National Defense and Industrial Base, Transportation, Internet, IoT,  Net Piracy, Naval (Maritime) and Aviation, Telemetry, Telemedicine, Sensor Systems, and others. 

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.