Security and Communication Networks

Data-Driven Cybersecurity


Publishing date
01 Aug 2019
Status
Closed
Submission deadline
05 Apr 2019

Lead Editor

1Sungkyunkwan University, Seoul, Republic of Korea

2Penn State University, State College, USA

3St. Pölten University of Applied Sciences, Sankt Pölten, Austria

4CSIRO Data61, Queensland, Australia

This issue is now closed for submissions.
More articles will be published in the near future.

Data-Driven Cybersecurity

This issue is now closed for submissions.
More articles will be published in the near future.

Description

In traditional cybersecurity approaches, data are managed in an ad hoc manner and often manually handled by a few experienced security analysts. However, as an increasing number of cybersecurity threats continuously appear over time, such conventional treatments have encountered limitations in mitigating cybersecurity threats and reducing their risks due to the fact that numerous advanced attacks are created and spread very quickly throughout the Internet. To address this issue, we need to develop more flexible and efficient security mechanisms that can respond to threats and update security rules in order to mitigate them in a timely manner. To develop such security mechanisms, it is inherently required to analyze a massive amount of data generated from various applications and generate proper security rules/policies with minimal human intervention in an automated manner.

To accomplish this goal, researchers are starting to use tools like Artificial Intelligence (AI) and Machine Learning (ML). Many of newly emerging security solutions are already adopting more data-driven approaches. Security Information and Event Management (SIEM) systems are a good example of this trend.

This special issue solicits original contributions dealing with data-driven analysis methods and techniques for cybersecurity solutions. Practical and theoretical papers related to data-driven analysis in cybersecurity are welcome.

Potential topics include but are not limited to the following:

  • Data-driven cyber threat and incident analysis
  • Data-driven software testing
  • Data-driven threat anticipation
  • Data-driven security architecture
  • Data-driven security incident management or response
  • Cybersecurity data analytics and visualization
  • AI for cybersecurity

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 1901548
  • - Research Article

CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis

Mee Lan Han | Byung Il Kwak | Huy Kang Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 3093809
  • - Research Article

Session-Based Webshell Detection Using Machine Learning in Web Logs

Yixin Wu | Yuqiang Sun | ... | Luping Liu
  • Special Issue
  • - Volume 2019
  • - Article ID 2317976
  • - Research Article

Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD

Dainius Čeponis | Nikolaj Goranin
  • Special Issue
  • - Volume 2019
  • - Article ID 8467081
  • - Research Article

Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

Jiaye Pan | Yi Zhuang | Binglin Sun
  • Special Issue
  • - Volume 2019
  • - Article ID 3648671
  • - Research Article

A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms

Baek Kyung Song | Joon Soo Yoo | ... | Ji Won Yoon
  • Special Issue
  • - Volume 2019
  • - Article ID 6268476
  • - Research Article

Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis

Daegeon Kim | Huy Kang Kim
  • Special Issue
  • - Volume 2019
  • - Article ID 1982168
  • - Research Article

Power Grid Estimation Using Electric Network Frequency Signals

Woorim Bang | Ji Won Yoon
  • Special Issue
  • - Volume 2019
  • - Article ID 6716918
  • - Research Article

A Data-Driven Approach to Cyber Risk Assessment

Paolo Santini | Giuseppe Gottardi | ... | Franco Chiaraluce
  • Special Issue
  • - Volume 2019
  • - Article ID 8565397
  • - Research Article

Evaluating the Impact of Name Resolution Dependence on the DNS

Haiyan Xu | Zhaoxin Zhang | ... | Xin Ma
Security and Communication Networks
 Journal metrics
Acceptance rate31%
Submission to final decision83 days
Acceptance to publication42 days
CiteScore4.200
Impact Factor1.288
 Submit
 Author guidelines  Editorial board  Databases and indexing
 Sign up for content alertsSign up

Publishing Collaboration

More info
Wiley-Hindawi

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.