Submission Deadline: 31 October 2026 View: 105 Submit to Special Issue
Dr. Jawad Ahmad
Email: jahmad@pmu.edu.sa
Affiliation: Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia
Research Interests: cyber security, information security, post-quantum cryptography, multimedia encryption, AI for security & healthcare

Dr. Muhammad Shahbaz Khan
Email: muhammadshahbaz.khan@napier.ac.uk
Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, United Kingdom
Research Interests: cyber security, quantum image encryption, post-quantum cryptography, quantum security, tust & privacy in cyber physical systems

Prof. Dr. Tamara Zhukabayeva
Email: zhukabayeva_tk@enu.kz
Affiliation: Department of Information Systems, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan
Research Interests: cyber security, Internet of Things (IoT), Blockchain, machine learning, routing protocols

Assoc. Prof. Nikolaos Pitropakis
Email: npitropakis@acg.edu
Affiliation: Cybersecurity and Computer Science, School of Science and Technology, The American College of Greece, Aghia Paraskevi, Greece
Research Interests: cyber security, adversarial machine learning, cloud computing security, malicious insiders

Information security has evolved into a highly complex and interdisciplinary research area, driven by the rapid growth of digital infrastructures, data-intensive applications, and increasingly sophisticated cyber threats. Alongside technological innovation, stricter data protection regulations and compliance requirements have further intensified the need for secure, efficient, and verifiable security mechanisms. Consequently, modeling-based analysis, algorithmic design, and experimental evaluation play an important role in advancing modern information and cybersecurity technologies.
This special issue aims to present recent advances in information security and cybersecurity, with emphasis on emerging technologies supported by computational modeling, algorithm development, and application-oriented studies. Topics of interest include, but are not limited to, security mechanisms for IoT, cloud, and cyber–physical systems, intrusion detection systems, AI- and machine-learning-driven security solutions, trust and privacy preservation, post-quantum cryptography, and image and multimedia encryption. We invite original research articles and high-quality review papers from academia and industry that address theoretical foundations, security models, algorithms, and real-world applications in information security.
Suggested themes include, but are not limited to:
- Computational Models for Trust, Privacy, and Data Protection
- Designing, modeling and analysis of secure communication, resilient networking, and trustworthy control for safety-critical cyber-physical infrastructures (CPS)
- Security Modeling for IoT and Cyber–Physical Systems
- Modeling and Simulation of Cloud, Edge, and Distributed System Security
- Modeling and Evaluation of Intrusion Detection and Anomaly Detection Systems
- AI- and Machine-Learning-Based Security Models and Algorithms
- Modeling and Analysis of Post-Quantum Cryptographic Schemes
- Image and Multimedia Encryption: Models, Algorithms, and Applications
- Blockchain Security Models and Trust Mechanisms
- Risk Assessment, Cyber Threat Modeling, and privacy-preserving data governance across interconnected systems
- Edge, fog, and IoT security architectures supporting large-scale, distributed, and real-time environments
- Post-quantum readiness, hybrid cryptographic architectures, and transition strategies for future-proof CPS security


Submit a Paper
Propose a Special lssue