Journal of Cybersecurity and Information Management (JCIM) aims to foster novel, transformative and multidisciplinary approaches that ensure the security of current and emerging information systems by taking into consideration the unique challenges present in the new smart environment, i.e. smart cities applications. JCIM also aims to foster a research community committed to advancing research and education at the confluence of cybersecurity, privacy, and cyber-physical systems, and to transitioning its findings into engineering practice. JCIMI is a quarterly published journal that publishes high-quality papers without Article Processing Charge but supports Open Access publishing too.
Aim and Scope:
Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions. Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered.
Topics of Interest:
JCIM promotes research and reflects the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:
Cybersecurity: The Current Threat and Future Challenges
Secure Data Encryption Models
Secure Information Systems: Challenges and Requirements
Security Procedures for Smart Networks Applications
Security Challenges for IoT based Applications
Secure Interfaces, protocols, and associated ad-hoc/sensor networks
Security and fault tolerance for embedded or ubiquitous systems
Sensor network security issues in mobile cloud computing
Ambient intelligence and intelligent service systems in secure IoT
Secure Geo-processing, Localization, and Location Based Services
Secure spatial data techniques and tools for analytics
Secure Smart city services and applications platforms
Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment
Secure, Fast and complexity-awareness algorithms for real-time computing for network
Scientific computing and secure data management
Protecting Information Resources
Threats to Information Security
Security assurance in information systems
Security procedures to ensure the integrity of information systems
Recent methodologies and techniques for security in Smart Cities Applications
Recent secure data aggregation and distribution algorithms
Key distribution algorithms
Protecting SCADA systems
Securely executing multilevel transactions
Adaptive attack mitigation for Cyber-Physical System
Data security and privacy for Cyber-Physical System
Security and privacy in industrial control systems
Smart grid security
Urban transportation system security
Secure data aggregation
Information Management and related topics
Prof. Vishal Jain, Associate Professor, Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), A-4, Paschim Vihar, New Delhi-63.
Prof. Valentina Emilia Balas, Full Professor at “Aurel Vlaicu” University of Arad, Romania. Prof. Surapong Bangphan, Department of Industrial Engineering, Faculty of Engineering, Rajamangala University of Technology Lanna.
Prof. Yagyanath Rimal, Faculty of Science and Technology, Department of Computing Science, Pokhara University, Pokhara Lekhnath, Nepal.
Prof. Enes Zengin, DUMPLUPINAR University, Turkey
Prof. Hasan Rashaideh, Applied Belqa University, Jordan.
Prof. Raghvendra Kumar Agrawal, Lakshmi Narain College of Technology, Bhopal.
Prof. PANIGRAHI SRIKANTH, GMR Institute of Technology (GMRIT).
Prof. Rohit Sharma, SRM Institute of science and Technology, India.
Dr. Ahmed A. Elngar
Assistant Professor Faculty of Computers & Artificial Intellegence , Beni-Suef University, Egypt