Aim and Scope
Aim and Scope:
Cybersecurity and privacy threats exploit the increased complexity and connectivity of critical infrastructure systems, placing the Nation’s security, economy, public safety, and health at risk. As technology becomes increasingly ubiquitous in daily life, cybercrime and cybersecurity tools and techniques evolve concurrently. This fuels the need to develop innovative managerial, technological and strategic solutions. Due to the constant evolution of cybercrimes and technologies advancements, identifying and validating technical solutions in order to access data from new technologies, investigating the impact of these solutions and understanding how technologies can be abused is crucial to the viability of government, commercial, academic, and legal communities, all of which affect national security. Accordingly, This journal focuses on cutting-edge research from both academia and industry, with a particular emphasis on interdisciplinary approaches and novel techniques to increase the security posture of the Internet- and Cloud-of-Things devices. It will focus on the research agendas that investigate vulnerabilities, attacks and associated mitigation strategies for devices that belong to the ‘Cyber-of-Things’ (e.g. Cyber-Physical Systems, and the Internet of Things) and research agendas that identify cyber-crimes, digital forensics issues, security vulnerabilities, solutions and approaches to improving the cybercrime investigation process. In addition, legal and privacy aspects of collecting, correlating and analyzing big-data from the Internet- and Cloud-of-Things devices including cost-effective retrieval, analysis, and evaluation. Moreover, secure information system and information management challenges, requirements, and methodologies will be covered.
Topics of Interest:
JCIM promotes research and reflects the most recent advances of security and privacy in cybersecurity systems, with emphasis on the following aspects, but certainly not limited to:
Cybersecurity: The Current Threat and Future Challenges
Secure Data Encryption Models
Secure Information Systems: Challenges and Requirements
Security Procedures for Smart Networks Applications
Security Challenges for IoT based Applications
Secure Interfaces, protocols, and associated ad-hoc/sensor networks
Security and fault tolerance for embedded or ubiquitous systems
Sensor network security issues in mobile cloud computing
Ambient intelligence and intelligent service systems in secure IoT
Secure Geo-processing, Localization, and Location Based Services
Secure spatial data techniques and tools for analytics
Secure Smart city services and applications platforms
Secure Smart city applications: mobility, energy, public administration & governance, economy, health, security and environment
Secure, Fast and complexity-awareness algorithms for real-time computing for network
Scientific computing and secure data management
Protecting Information Resources
Threats to Information Security
Wireless Security
Security assurance in information systems
Security procedures to ensure the integrity of information systems
Recent methodologies and techniques for security in Smart Cities Applications
Recent secure data aggregation and distribution algorithms
Key distribution algorithms
Protecting SCADA systems
Securely executing multilevel transactions
Adaptive attack mitigation for Cyber-Physical System
Data security and privacy for Cyber-Physical System
Security and privacy in industrial control systems
Smart grid security
Urban transportation system security
Secure data aggregation
Information Management and related topics