applsci-logo

Journal Browser

Journal Browser

New Advances in Computer Security and Cybersecurity

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Computing and Artificial Intelligence".

Deadline for manuscript submissions: 20 May 2025 | Viewed by 4869

Special Issue Editor


E-Mail Website
Guest Editor
1. Department of Informatics and Media, Technische Hochschule Brandenburg, Magdeburger Str. 50, D-14770 Brandenburg, Germany
2. Berlin School of Technology, SRH Berlin Applied University of Technology, Ernst-Reuter-Platz 10, D-10587 Berlin, Germany
Interests: cybersecurity

Special Issue Information

Dear Colleagues,

Recent advances in cybersecurity have significantly enhanced protection mechanisms against cyber threats. This Special Issue in the MDPI Journal of Applied Sciences delves into cutting-edge research and innovative practices across various computer security and cybersecurity aspects. A key focus is enhancing cyber resilience, which aims to fortify systems against attacks and ensure swift recovery from breaches. Furthermore, open-source intelligence (OSINT) is now essential for preemptive threat detection and strategic security planning.

The protection of critical infrastructure is a top priority, as vulnerabilities in these systems can cause severe economic and social consequences. This Special Issue's articles present robust strategies for shielding such infrastructures from sophisticated cyber-attacks. Furthermore, the integration of cybersecurity measures within cyber–physical systems is highlighted, underscoring the importance of securing the interconnected elements that manage physical processes through computer-based algorithms.

The journal's convergence of these themes results in a comprehensive overview of current trends and future directions in the field of computer security. This collection of research provides deep insights into technological advancements and discusses the broader implications of these developments for society and policy-making.

Dr. Reiner Creutzburg
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cyber security
  • computer security
  • cyber resilience
  • open-source intelligence (OSINT)
  • critical infrastructure protection
  • cyber–physical systems
  • secure communications and cryptography

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Other

29 pages, 4662 KiB  
Article
A Country Risk Assessment from the Perspective of Cybersecurity in Local Entities
by Javier Sanchez-Zurdo and Jose San-Martín
Appl. Sci. 2024, 14(24), 12036; https://doi.org/10.3390/app142412036 - 23 Dec 2024
Viewed by 453
Abstract
The number of vulnerabilities identified annually has increased substantially, thereby raising the risks associated with online services. The implementation of cybersecurity management measures in accordance with the European NIS2 Directive is optional at the local authority level. This study analyzes the external perimeter [...] Read more.
The number of vulnerabilities identified annually has increased substantially, thereby raising the risks associated with online services. The implementation of cybersecurity management measures in accordance with the European NIS2 Directive is optional at the local authority level. This study analyzes the external perimeter of nearly 7000 municipalities and proposes a simplified security framework that provides a comprehensive view of security across regions. A complete data set was assembled on the Technological and Competence profiles of all municipalities in Spain over a two-year period. The data were gathered from the external perimeter in relation to security, availability and SEO posture areas. A survey was conducted to determine the level of concern among citizens regarding cybersecurity issues in online municipal services, with 188 respondents. Some regions were identified as exhibiting particularly high and homogeneous levels of security. In contrast, other regions were found to be below the expected level. The presence of supra-local entities, such as the “Diputaciones”, has been demonstrated to facilitate the harmonization of regional security, while simultaneously reducing technological fragmentation and operational expenditure. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

32 pages, 1395 KiB  
Article
Addressing Cybersecurity Challenges in Times of Crisis: Extending the Sociotechnical Systems Perspective
by Samreen Mahmood, Mehmood Chadhar and Selena Firmin
Appl. Sci. 2024, 14(24), 11610; https://doi.org/10.3390/app142411610 - 12 Dec 2024
Viewed by 915
Abstract
Recent crises have significantly amplified cybersecurity challenges. Numerous studies have identified these challenges during major crises; however, empirical investigations using a sociotechnical systems (STS) theoretical perspective remain limited. Against this backdrop, this research study examines and categorizes cybersecurity challenges in the Higher Education [...] Read more.
Recent crises have significantly amplified cybersecurity challenges. Numerous studies have identified these challenges during major crises; however, empirical investigations using a sociotechnical systems (STS) theoretical perspective remain limited. Against this backdrop, this research study examines and categorizes cybersecurity challenges in the Higher Education and Research Sector (HERS) through the lens of STS theory. Utilizing a qualitative methodology, semi-structured interviews were conducted with cybersecurity experts and top managers. This study proposes an STS cybersecurity framework, classifying challenges into five subsystems: social, technical, political, economic, and environmental. This framework expands on previous literature by incorporating factors often overlooked, such as cybersecurity challenges arising from internal and external environmental conditions, legal and regulatory political factors, and national and global economic factors. This research provides valuable theoretical and practical insights applicable beyond the context of the recent crisis. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

29 pages, 2233 KiB  
Article
AI-Enhanced Disaster Management: A Modular OSINT System for Rapid Automated Reporting
by Klaus Schwarz, Kendrick Bollens, Daniel Arias Aranda and Michael Hartmann
Appl. Sci. 2024, 14(23), 11165; https://doi.org/10.3390/app142311165 - 29 Nov 2024
Viewed by 524
Abstract
This paper presents the Open-Source Intelligence Disaster Event Tracker (ODET), a modular platform that provides customizable endpoints and agents for each processing step. ODET enables the implementation of AI-enhanced algorithms to respond to various complex disaster scenarios. To evaluate ODET, we conducted two [...] Read more.
This paper presents the Open-Source Intelligence Disaster Event Tracker (ODET), a modular platform that provides customizable endpoints and agents for each processing step. ODET enables the implementation of AI-enhanced algorithms to respond to various complex disaster scenarios. To evaluate ODET, we conducted two case studies using unmodified AI models to demonstrate its base performance and potential applications. Through our case studies on Hurricane Harvey and the 2023 Turkey earthquake, we show how complex tasks can be quickly broken down with ODET while achieving a score of up to 89% using the AlignScore metric. ODET enables compliance with Berkeley protocol requirements by ensuring data privacy and using privacy-preserving processing methods. Our results demonstrate that ODET is a robust platform for the long-term monitoring and analysis of dynamic environments and can improve the efficiency and accuracy of situational awareness reports in disaster management. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

21 pages, 526 KiB  
Article
Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANET
by Rudyard Fuster, Patricio Galdames and Claudio Gutierréz-Soto
Appl. Sci. 2024, 14(22), 10480; https://doi.org/10.3390/app142210480 - 14 Nov 2024
Viewed by 516
Abstract
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting [...] Read more.
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of location-based queries (LBQs) to reduce data exposure to untrusted LBS servers. Unlike existing approaches that rely on centralized servers or stationary infrastructure, our solution facilitates direct data exchange between users’ devices, providing an additional layer of privacy protection. We introduce a new privacy entropy-based metric called accumulated privacy loss (APL) to quantify the privacy loss incurred when accessing either the LBS or our proposed system. Our approach implements a two-tier caching strategy: local caching maintained by each user and neighbor caching based on proximity. This strategy not only reduces the number of queries to the LBS server but also significantly enhances user privacy by minimizing the exposure of location data to centralized entities. Empirical results demonstrate that while our collaborative caching system incurs some communication costs, it significantly mitigates redundant data among user caches and reduces the need to access potentially privacy-compromising LBS servers. Our findings show a 40% reduction in LBS queries, a 64% decrease in data redundancy within cells, and a 31% reduction in accumulated privacy loss compared to baseline methods. In addition, we analyze the impact of data obsolescence on cache performance and privacy loss, proposing mechanisms for maintaining the relevance and accuracy of cached data. This work contributes to the field of privacy-preserving LBSs by providing a decentralized, user-centric approach that improves both cache redundancy and privacy protection, particularly in scenarios where central infrastructure is unreachable or untrusted. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

13 pages, 1300 KiB  
Article
PEDRO: Privacy-Enhancing Decision suppoRt tOol
by Paul van Schaik and Karen Renaud
Appl. Sci. 2024, 14(20), 9275; https://doi.org/10.3390/app14209275 - 11 Oct 2024
Viewed by 793
Abstract
Citizens face online privacy threats from social media, online service providers and governments. Privacy-enhancing tools (PETs) can prevent privacy invasion, but the uptake of these is limited. We developed a novel conceptual framework for privacy self-protection, consisting of a classification framework of four [...] Read more.
Citizens face online privacy threats from social media, online service providers and governments. Privacy-enhancing tools (PETs) can prevent privacy invasion, but the uptake of these is limited. We developed a novel conceptual framework for privacy self-protection, consisting of a classification framework of four distinct privacy threats and our own novel staged model of PET adoption requisites. Through an expert survey (N = 12) and a lay user survey (N = 500), we identified suitable PETs for non-expert users and identified potential barriers to PET adoption. Based on the studies and our theoretical framework, we then developed and implemented a PET decision support tool called PEDRO, and conducted expert evaluations (N = 10) to confirm the validity of its recommendations. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

Other

Jump to: Research

31 pages, 920 KiB  
Systematic Review
Risk Assessment for Cyber Resilience of Critical Infrastructures: Methods, Governance, and Standards
by Ali Aghazadeh Ardebili, Marianna Lezzi and Mahdad Pourmadadkar
Appl. Sci. 2024, 14(24), 11807; https://doi.org/10.3390/app142411807 - 17 Dec 2024
Viewed by 666
Abstract
As future infrastructures increasingly rely on digital systems, their exposure to cyber threats has grown significantly. The complex and hyper-connected nature of these systems presents challenges for enhancing cyber resilience against adverse conditions, stresses, attacks, or compromises on cybersecurity resources. Integrating risk assessment [...] Read more.
As future infrastructures increasingly rely on digital systems, their exposure to cyber threats has grown significantly. The complex and hyper-connected nature of these systems presents challenges for enhancing cyber resilience against adverse conditions, stresses, attacks, or compromises on cybersecurity resources. Integrating risk assessment with cyber resilience allows for adaptive approaches that can effectively safeguard critical infrastructures (CIs) against evolving cyber risks. However, the wide range of methods, frameworks, and standards—some overlapping and others inadequately addressed in the literature—complicates the selection of an appropriate approach to cyber risk assessment for cyber resilience. To investigate this integration, this study conducts a systematic literature review (SLR) of relevant methodologies, standards, and regulations. After conducting the initial screening of 173 publications on risk assessment and cyber resilience, 40 papers were included for thorough review. The findings highlight risk assessment methods, standards, and guidelines used for cyber resilience and provide an overview of relevant regulations that strengthen cyber resilience through risk assessment practices. The results of this paper will offer cybersecurity researchers and decision-makers an illuminated understanding of how risk assessment enhances cyber resilience by extracting risk assessment best practices in the literature supported by relevant standards and regulations. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

Back to TopTop pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy