Special Issues
Table of Content

Emerging Technologies in Information Security: Modeling, Algorithms, and Applications

Submission Deadline: 31 October 2026 View: 2367 Submit to Special Issue

Guest Editor(s)

Dr. Jawad Ahmad

Email: jahmad@pmu.edu.sa

Affiliation: Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia

Homepage:

Research Interests: cyber security, information security, post-quantum cryptography, multimedia encryption, AI for security & healthcare

图片1.png


Dr. Muhammad Shahbaz Khan

Email: muhammadshahbaz.khan@napier.ac.uk

Affiliation: School of Computing, Engineering and the Built Environment, Edinburgh Napier University, Edinburgh, EH10 5DT, United Kingdom

Homepage:

Research Interests: cyber security, quantum image encryption, post-quantum cryptography, quantum security, tust & privacy in cyber physical systems

111111.png


Prof. Dr. Tamara Zhukabayeva

Email: zhukabayeva_tk@enu.kz

Affiliation: Department of Information Systems, L.N. Gumilyov Eurasian National University, Astana, Kazakhstan

Homepage:

Research Interests: cyber security, Internet of Things (IoT), Blockchain, machine learning, routing protocols

22222.png


Assoc. Prof. Nikolaos Pitropakis

Email: npitropakis@acg.edu

Affiliation: Cybersecurity and Computer Science, School of Science and Technology, The American College of Greece, Aghia Paraskevi, Greece

Homepage:

Research Interests: cyber security, adversarial machine learning, cloud computing security, malicious insiders

444444.png


Summary

Information security has evolved into a highly complex and interdisciplinary research area, driven by the rapid growth of digital infrastructures, data-intensive applications, and increasingly sophisticated cyber threats. Alongside technological innovation, stricter data protection regulations and compliance requirements have further intensified the need for secure, efficient, and verifiable security mechanisms. Consequently, modeling-based analysis, algorithmic design, and experimental evaluation play an important role in advancing modern information and cybersecurity technologies.


This special issue aims to present recent advances in information security and cybersecurity, with emphasis on emerging technologies supported by computational modeling, algorithm development, and application-oriented studies. Topics of interest include, but are not limited to, security mechanisms for IoT, cloud, and cyber–physical systems, intrusion detection systems, AI- and machine-learning-driven security solutions, trust and privacy preservation, post-quantum cryptography, and image and multimedia encryption. We invite original research articles and high-quality review papers from academia and industry that address theoretical foundations, security models, algorithms, and real-world applications in information security.

 
Suggested themes include, but are not limited to:
- Computational Models for Trust, Privacy, and Data Protection
- Designing, modeling and analysis of secure communication, resilient networking, and trustworthy control for safety-critical cyber-physical infrastructures (CPS)
- Security Modeling for IoT and Cyber–Physical Systems
- Modeling and Simulation of Cloud, Edge, and Distributed System Security
- Modeling and Evaluation of Intrusion Detection and Anomaly Detection Systems
- AI- and Machine-Learning-Based Security Models and Algorithms
- Modeling and Analysis of Post-Quantum Cryptographic Schemes
- Image and Multimedia Encryption: Models, Algorithms, and Applications
- Blockchain Security Models and Trust Mechanisms
- Risk Assessment, Cyber Threat Modeling, and privacy-preserving data governance across interconnected systems
- Edge, fog, and IoT security architectures supporting large-scale, distributed, and real-time environments
- Post-quantum readiness, hybrid cryptographic architectures, and transition strategies for future-proof CPS security


Keywords

security modeling, information security, cybersecurity, intrusion detection, artificial intelligence in security, trust and privacy, post-quantum cryptography, image and multimedia encryption, IoT security, cloud security

Published Papers


  • Open Access

    ARTICLE

    Trust-Centric Security Architecture and Anomaly Analytics for Distributed Fog-IoT Systems

    Maram Fahaad Almufareh, Mamoona Humayun, Sadia Din, Khalid Haseeb, Amr Munshi
    CMES-Computer Modeling in Engineering & Sciences, Vol.147, No.1, 2026, DOI:10.32604/cmes.2026.080287
    (This article belongs to the Special Issue: Emerging Technologies in Information Security: Modeling, Algorithms, and Applications)
    Abstract The real-time systems perform key functionalities in various fields to automate the communication and response in critical events. The Internet of Things (IoT), integrated with numerous physical objects, gathers environmental data, processes it at the edge, and provides intelligent decisions while routing health records to processing units. However, the dynamic and resource-constrained nature of IoT-based healthcare environments introduces significant challenges related to latency, transmission costs, and the reliable interaction of devices amid uncertain activities. In this work, we propose a framework for a consistent and trustworthy system that uses a weighted trust aggregation model to More >

Share Link