ISSN :3049-2335

Aims and Scope

The aims and scope of "Advances in Knowledge-Based Systems, Data Science, and Cybersecurity" are but not limited to:



Topic 1

Topic 2

Topic 3

Topic 4

Topic 5

Topic 6

Access control

AI

AI and security

AI in industry sectors

AI security

AI/machine learning in security

AI-supported economy

Advanced Statistics

Android/iOS security

Analytics

Anti-virus and anti-hacker measures

Applications relating to information forensics

Applied computing

Applied cryptography

Artificial Intelligence Security

Auditing and Intrusion Detection

Authentication

Authenticated Key Agreement Protocols

Authetication and Access Control

Bayesian/probabilistic methods

Big Data Security and Privacy

Big data analytics

Big data processing

Big data technologies

Biometric applications security

Biometrics

Blockchain

Blockchain & Smart Contract

Blockchain Theory and Practice

Blockchain security

Business analytics

Business intelligence

Cloud Security

Cloud computing

Cognitive interaction

Computer crime prevention/detection

Computer physical security

Computer science and security

Computer vision

Compliance

Confidentiality protection

Content protection

Critical infrastructure protection

Criminological research

Cryptanalysis

Cryptographic Algorithms

Cryptographic Hardware and Embedded Systems

Cryptography and Cryptology

Cryptography and associated topics

Cryptography and data protection

Cyber Governance

Cyber Law

Cyber attacks

Cyber policy

Cyber security

Cyber security education

Cyber security in Cloud

Cyber security in Internet of Things (IoT)

Cyber threat analysis

Cyber threat intelligence

Cyber victimology and psychopathology

Cyber warfare

Cybercrime

Cybercrime laws

Cyber–Physical System Security

Cyber–Physical Systems

Cybersecurity

Cybersecurity and Information Security

Cybersecurity data analytics

Cybersecurity training and curriculum research

DDoS attacks

Data Science Security

Data analytics

Data base security

Data capture and storage

Data-driven innovation

Data integration and privacy

Data loss prevention (DLP)

Data mining

Data mining in healthcare

Data mining in security

Data visualization

Data warehousing

Database and data security

Database Security

Decision making

Decision support

Denial of service protection

Descriptive Statistics

Digital Forensics & Security

Digital and Information Forensics

Digital forensics

Digital forensics and law enforcement investigation

Digital fraud

Digital rights

Digital transformation

Distributed file systems

Distributed systems

E-Business Security

E-Health Security

Edge computing

Electronic commerce

Electronic government

Emerging technologies

Emerging trends in cyber security

Encryption

Espionage

Ethics in AI

Evidence theory

Expert columns

Finance and risk analytics

Financial fraud

Firewalls

Formal Methods in Information Security

Formal methods in information security

Forensic informatics

Foundations

Foundations of Cryptology

Focuses on cyber conflict

Foundational and philosophical aspects of information security

Graph analytics

Hardware security

High-performance computing

Human Factors in Cyber Security

Human Factors in Security

Human factors and psychology

Human–computer interaction

HCI

IDS

IoT Security

Identification

Identity theft

Incident forensics

Incident Response

Inferential Statistics

Information ethics

Information Hiding (Steganography, Watermarking, ...)

Information retrieval

Information science and security

Information security

Information systems

Information warfare

Infrastructure security

Insider threats

Intelligent decision support

Intelligent information retrieval

Intelligent processing

Intelligent Transportation Systems (ITS)

Internet fraud

Internet of Things (IoT) security

Internet security

Intrusion detection

Intrusion detection and prevention

Intrusion detection systems and firewall

IoT security

IoT security trends

IT Governance

Key generation and key distribution schemes

Knowledge discovery

Knowledge engineering

Knowledge graphs

Knowledge-based systems

Legal aspects of information security

Legal frameworks

Legal/cyber-risk/digital forensics

Logical

Logical and philosophical aspects of security

Machine Learning

Machine Learning in Security

Machine learning algorithms

Machine learning mechanisms for cyber security

Malware

Malware analysis

Malware and botnet detection

Marketing and retail analytics

Methodological

Mobility

Modern tools for improving cyber security

Multimedia & mobile security

Natural Language Processing (NLP)

Network Security

Network and critical infrastructure security

Network and Data Security

NLP and text analytics

Ontology

Operating Systems Security

Optimization

OS security

Pattern recognition

Pervasive computing security

Phishing

Phishing defenses

Philosophical aspects of information security

Policies

Policy

Policy development

Political and policy perspectives

Privacy

Privacy and Anonymity

Privacy and Cyber Threat

Privacy-enhancing technologies

Privacy-enhancing technologies and anonymity

Protocols

QoS and business models

Quantum Cryptography

Quantum Security

Quantum-safe digital signature schemes

Quantum-safe encryption

Quantum-safe encryption algorithms

Quantum-safe key management mechanisms

Ransomware

Recommender systems

Risk Management

Risk management

Safety-critical systems

Scalable storage systems

Secure communications technology and computer systems

Secure end systems

Secure operating systems

Secure software development

Secure Software Development / Software Security

Security

Security agents

Security control measures, policy models and authentication

Security economics

Security evaluation

Security infrastructures

Security issues in Intelligent Transportation Systems (ITS)

Security modelling

Security Protocols

Security Risk and Engineering

Security training

SIEM systems

Smart cities

Social and geographic dimensions of cyber offending

Social media abuse detection

Social media analysis

Software and hardware security architectures

Software protection

Software/system security

Software/hardware security

Spoofing protection

Statistical foundations

Steganography and Secure Communication

Strategy and international relations

Strategic cyber threats

Surveillance and systems applications

Supply chain and logistics analytics

System security

Tamper resistant software

Telecommunications

Telecommunication security

Text analytics

Threat detection/protection

Threat intelligence summaries

Trends of crime

Trust and safety

Uncertainty modeling

Virus/worm controls

Vulnerabilities (Modeling, Analysis, ...)

Web and social media analytics

Wireless/mobile network and data security