Security and Communication Networks

Artificial Intelligence for Cyberspace Security


Publishing date
01 Mar 2022
Status
Closed
Submission deadline
05 Nov 2021

Lead Editor

1Guangzhou University, Guangzhou, China

2The University of Hong Kong, Hong Kong

3University of Illinois Springfield, Springfield, USA

4Kennesaw State University, Kennesaw, USA

This issue is now closed for submissions.
More articles will be published in the near future.

Artificial Intelligence for Cyberspace Security

This issue is now closed for submissions.
More articles will be published in the near future.

Description

Cyberspace security has become popular in recent years due to the serious consequences of cyber-attacks. The effectiveness of traditional tools and methods have been greatly reduced since many cutting-edge technologies are used in advanced attacks to evade traditional defense technologies.

Artificial Intelligence (AI) has been adopted in various applications. It has been very successful in many subject areas such as image recognition, natural language processing, speech recognition, etc. AI is also used to detect suspicious network traffic, analyze malicious attacks, identify attack sources, etc. Considering adversarial activities in the real world, AI also faces many new challenges in cyberspace security, such as novel attacks that could evade AI-based detection due to the vulnerability of AI.

The aim of this Special Issue is to bring together original research and review articles that address the newly emerged security theories and technologies in cyberspace security. Submissions can also include AI technologies for detecting and defending against cyber-attacks. Both theoretical and experimental studies are encouraged.

Potential topics include but are not limited to the following:

  • AI-based methods for cyberspace security
  • AI-based methods for cyber attacks
  • AI-based detection/defense for cyber attacks
  • AI for protecting data in cyberspace security
  • AI for system security in cyberspace
  • AI for mobile security
  • Adversarial attack and defense in cyberspace
  • Adversarial machine learning in cyberspace
  • Novel ideas, algorithms, models, frameworks, systems for understanding and improving cyberspace security
  • Research challenges in AI for cyberspace security

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 5713074
  • - Research Article

Dimension Reduction Technique Based on Supervised Autoencoder for Intrusion Detection of Industrial Control Systems

Chao Wang | Hongri Liu | ... | Bailing Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 1833362
  • - Research Article

Vehicle Re-Identification System Based on Appearance Features

Dawei Xu | Yunfan Yang | ... | Jian Zhao
  • Special Issue
  • - Volume 2022
  • - Article ID 6458488
  • - Review Article

Text Adversarial Attacks and Defenses: Issues, Taxonomy, and Perspectives

Xu Han | Ying Zhang | ... | Bin Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 1919907
  • - Research Article

HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source-Level Intermediate Representation

Zihua Song | Junfeng Wang | ... | Kaiyuan Yang
  • Special Issue
  • - Volume 2022
  • - Article ID 1258482
  • - Research Article

Network Host Cardinality Estimation Based on Artificial Neural Network

Xu Jie | Lan Haoliang | ... | Ju Ao
  • Special Issue
  • - Volume 2022
  • - Article ID 3434920
  • - Research Article

A New Method for WebShell Detection Based on Bidirectional GRU and Attention Mechanism

Zhiqiang Liu | Daofeng Li | Lulu Wei
  • Special Issue
  • - Volume 2022
  • - Article ID 1844345
  • - Research Article

Deep Learning-Based Channel Reciprocity Learning for Physical Layer Secret Key Generation

Haoyu He | Yanru Chen | ... | Liangyin Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 9779670
  • - Research Article

A Lightweight Authentication with Dynamic Batch-Based Group Key Management Using LSTM in VANET

Xieyang Shen | Chuanhe Huang | ... | Danxin Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 9875199
  • - Research Article

CTI View: APT Threat Intelligence Analysis System

Yinghai Zhou | Yi Tang | ... | Hai Lu
  • Special Issue
  • - Volume 2021
  • - Article ID 3095203
  • - Research Article

Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding

Shen Wang | Xunzhi Jiang | ... | Xiaohui Su
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate53%
Submission to final decision52 days
Acceptance to publication25 days
CiteScore3.300
Journal Citation Indicator0.430
Impact Factor1.968
 Submit

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.