Special Issues
Table of Content

Emerging Technologies in Information Security: Modeling, Algorithms, and Applications

Submission Deadline: 31 October 2026 View: 105 Submit to Special Issue

Guest Editors

Dr. Jawad Ahmad

Email: jahmad@pmu.edu.sa

Affiliation: Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia

Homepage:

Research Interests: cyber security, information security, post-quantum cryptography, multimedia encryption, AI for security & healthcare

图片1.png


Dr. Muhammad Shahbaz Khan

Email: muhammadshahbaz.khan@napier.ac.uk

Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, United Kingdom

Homepage:

Research Interests: cyber security, quantum image encryption, post-quantum cryptography, quantum security, tust & privacy in cyber physical systems

111111.png


Prof. Dr. Tamara Zhukabayeva

Email: zhukabayeva_tk@enu.kz

Affiliation: Department of Information Systems, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan

Homepage:

Research Interests: cyber security, Internet of Things (IoT), Blockchain, machine learning, routing protocols

22222.png


Assoc. Prof. Nikolaos Pitropakis

Email: npitropakis@acg.edu

Affiliation: Cybersecurity and Computer Science, School of Science and Technology, The American College of Greece, Aghia Paraskevi, Greece

Homepage:

Research Interests: cyber security, adversarial machine learning, cloud computing security, malicious insiders

444444.png


Summary

Information security has evolved into a highly complex and interdisciplinary research area, driven by the rapid growth of digital infrastructures, data-intensive applications, and increasingly sophisticated cyber threats. Alongside technological innovation, stricter data protection regulations and compliance requirements have further intensified the need for secure, efficient, and verifiable security mechanisms. Consequently, modeling-based analysis, algorithmic design, and experimental evaluation play an important role in advancing modern information and cybersecurity technologies.


This special issue aims to present recent advances in information security and cybersecurity, with emphasis on emerging technologies supported by computational modeling, algorithm development, and application-oriented studies. Topics of interest include, but are not limited to, security mechanisms for IoT, cloud, and cyber–physical systems, intrusion detection systems, AI- and machine-learning-driven security solutions, trust and privacy preservation, post-quantum cryptography, and image and multimedia encryption. We invite original research articles and high-quality review papers from academia and industry that address theoretical foundations, security models, algorithms, and real-world applications in information security.

 
Suggested themes include, but are not limited to:
- Computational Models for Trust, Privacy, and Data Protection
- Designing, modeling and analysis of secure communication, resilient networking, and trustworthy control for safety-critical cyber-physical infrastructures (CPS)
- Security Modeling for IoT and Cyber–Physical Systems
- Modeling and Simulation of Cloud, Edge, and Distributed System Security
- Modeling and Evaluation of Intrusion Detection and Anomaly Detection Systems
- AI- and Machine-Learning-Based Security Models and Algorithms
- Modeling and Analysis of Post-Quantum Cryptographic Schemes
- Image and Multimedia Encryption: Models, Algorithms, and Applications
- Blockchain Security Models and Trust Mechanisms
- Risk Assessment, Cyber Threat Modeling, and privacy-preserving data governance across interconnected systems
- Edge, fog, and IoT security architectures supporting large-scale, distributed, and real-time environments
- Post-quantum readiness, hybrid cryptographic architectures, and transition strategies for future-proof CPS security


Keywords

security modeling, information security, cybersecurity, intrusion detection, artificial intelligence in security, trust and privacy, post-quantum cryptography, image and multimedia encryption, IoT security, cloud security

Share Link