Special lssues
Table of Content

Cyber Threat Intelligence and Smart Applications Secured Techniques

Submission Deadline: 29 July 2022 (closed)

Guest Editors

Dr. Sundresan Perumal, University Sains Islam Malaysia, Malaysia.
Dr. Valliappan Raman, Anna University, India.
Dr. Ganthan A/l Narayana Samy, Universiti Teknologi Malaysia, Malaysia.
Mr. Mujahid Tabassum, University of Technology and Applied Sciences, Oman.


Selected peer-reviewed papers from researchers in the fields of cyber security and smart applications will be accepted for publication in this special issue. It will focus on latest Cyber Threat Intelligence and smart application secured techniques in recent era.

A technology that has the potential to fundamentally alter the defensive strategy against cyberattacks by constructing a security knowledge system and can respond to intelligent cyberattacks before they occur is known as cyber threat intelligence (CTI). CTI is the organization and sharing of threat information that are driving innovation in networks and security solutions. Threat detection, intelligent threat analysis, are some of the techniques used in CTI. Threat intelligence, when properly deployed, may assist security officers and teams in defending against an increasingly sophisticated threat landscape before, during, and after an assault. In other words, by researching and understanding their adversaries' methods and aims, businesses may develop more effective and more comprehensive cyber-defences than they could otherwise. CTI technology has been growing into infrastructure areas such as Internet of Things (IoT), and smart networks in recent years, making significant contributions to advancements in system confidentiality and integrity as well as availability, privacy, and scalability.

Since remote working has become more common, cyber attackers have expanded their advanced persistent threats (APT), such as phishing, spear-phishing, and zero-day attacks, to target vulnerabilities in personal computers and networked devices in the house. To protect home and business networks from emerging cyber dangers, it is critical to develop well-designed privacy security approaches, algorithms, protocols, standards, and regulations.

• Design and analysis of CTI system architecture

• New operation strategy for CTI and Data representation models

• Data sharing model and Data analysis methodology for CTI

• Machine learning techniques and tools used for CTI

• Automated and intelligent data collection, feature classification, and forensic analysis

• Integration of incident response and digital forensic

• Implementation of cyber security and intelligence technologies

• A methodology and system analysis for cyberattack trends

• Intelligent security practices in Smart Applications

• Privacy-enabled human factor models against cyberattacks

• Secure and distributed semantic techniques for modelling smart networks


Cyber security, Smart applications, Cyber Threat Intelligence, Secured techniques, Defensive strategy cyberattacks, Cyber threat intelligence

Share Link