Security and Communication Networks

Recent Advancements in Digital Forensics in Recent Emerging Technologies


Publishing date
01 Apr 2022
Status
Closed
Submission deadline
10 Dec 2021

Lead Editor

1Northwestern Polytechnical University, Xi'an, China

2University of Faisalabad, Faisalabad, Pakistan

3University of the West of England, Bristol, UK

This issue is now closed for submissions.

Recent Advancements in Digital Forensics in Recent Emerging Technologies

This issue is now closed for submissions.

Description

The perpetrators of cybercrime are developing their methods in parallel with developments in various emerging fields, such as the Internet of things (IoT), blockchain, autonomous vehicles, quantum computing, and ransomware. Ransomware or malware affected phishing emails, spam, information warfare, carding, phishing scams, and identity theft are just a few examples. This makes digital forensics a vital field of study for academics, professionals, and researchers. In recent years, the propagation of illegal, obscene, or offensive content, particularly for harassment purposes (for example, cyberstalking, internet trolling, cyberbullying, cyber-racism, online predators) and threats are increasing concerns for both security and privacy. This has paved the way for new developments and applications for digital forensics, security, and privacy in emerging technologies. In order to gather and examine digital evidence in current software frameworks, we face the "built-in" question of how to develop and build forensic awareness in software applications, such that a cooperative environment can be created for digital forensic purposes. The internet has made it easier to access open-source software by offering an incentive for hackers to conduct confidential attacks.

Another challenge in the recent era of emerging technologies is at the hardware end, since the rapid expansion of networks and devices in global communication and networking has made the investigation of cyber-attacks difficult. For law enforcement, national security, and information security, the areas of digital forensics and cybercrime inquiries are now extremely relevant. Quantum computing technology has significant potential to significantly change the field of cybersecurity, with significant opportunities and threats rapidly arising. For example, the possibility of optimized quantum computers capable of solving complex problems frequently used by cryptographic algorithms would threaten the confidentiality of our communication channels. Simultaneously, the implementation of urban quantum communication systems might provide an infrastructure for the implementation of potentially encrypted messaging protocols to avoid this threat. Although the given descriptions are significant, quantum technologies have a much broader impact on computer security applications.

This Special Issue welcomes manuscripts on all aspects of the modeling, design, implementation, deployment, and management of security, forensics and privacy, protocols, and security breaches in quantum computing and ransomware-based software. It also emphasizes the role of digital forensics in academic and judicial matters as well as its significant role in information security and software cloning. It covers not only technologies and scientific proof, but also how professionals are trained for software forensics careers. We welcome both original research and review articles.

Potential topics include but are not limited to the following:

  • Digital forensics for IoT-based networks
  • Digital forensics for code semantics
  • Digital forensics for software privacy and security
  • Digital forensics for artificial intelligence
  • Big data and digital forensics
  • Block-chain technology and digital forensics
  • Theoretical foundations of digital forensics
  • Cybersecurity and digital forensics
  • Digital forensics of quantum computing
  • Quantum hacking and digital forensics
  • Digital forensics for quantum cryptanalysis
  • Digital forensics for secure key distribution in quantum computing
  • Digital forensics for ransomware-based software
  • Digital forensics-based prevention algorithms for ransomware
  • Digital forensics for malware analysis, including ransomware

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5680357
  • - Research Article

An Efficient Lightweight Image Encryption Scheme Using Multichaos

Asad Ullah | Awais Aziz Shah | ... | Jawad Ahmad
  • Special Issue
  • - Volume 2022
  • - Article ID 2959222
  • - Review Article

Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review

Rahman Ali | Asmat Ali | ... | Farhan Ullah
  • Special Issue
  • - Volume 2022
  • - Article ID 1424638
  • - Research Article

Digital Forensics as Advanced Ransomware Pre-Attack Detection Algorithm for Endpoint Data Protection

Jian Du | Sajid Hussain Raza | ... | Muhammad Asif Habib
  • Special Issue
  • - Volume 2022
  • - Article ID 9291971
  • - Review Article

Overview of Image Inpainting and Forensic Technology

Kai Liu | Junke Li | Syed Sabahat Hussain Bukhari
  • Special Issue
  • - Volume 2022
  • - Article ID 1322264
  • - Research Article

Proving Reliability of Image Processing Techniques in Digital Forensics Applications

Saima Iqbal | Wilayat Khan | ... | Shtwai Alsubai
  • Special Issue
  • - Volume 2022
  • - Article ID 2109024
  • - Research Article

Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces

Mohib Ullah | Rafi Ullah Khan | ... | Muhammad Arshad Islam
  • Special Issue
  • - Volume 2022
  • - Article ID 9692892
  • - Research Article

Radio Network Forensic with mmWave Using the Dominant Path Algorithm

Usman Rauf Kamboh | Muhammad Rehman Shahid | ... | Ubaid Ullah
  • Special Issue
  • - Volume 2021
  • - Article ID 4494447
  • - Research Article

Digital Forensics Use Case for Glaucoma Detection Using Transfer Learning Based on Deep Convolutional Neural Networks

Jahanzaib Latif | Shanshan Tu | ... | Muhammad Farhan
  • Special Issue
  • - Volume 2021
  • - Article ID 3320436
  • - Research Article

Privacy-Aware Data Forensics of VRUs Using Machine Learning and Big Data Analytics

Muhammad Babar | Muhammad Usman Tariq | ... | Mohammad Dahman Alshehri
  • Special Issue
  • - Volume 2021
  • - Article ID 2897565
  • - Research Article

SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns’ Detection

Amir Ali | Zain Ul Abideen | Kalim Ullah
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.