Aims
Advances in Knowledge-Based Systems, Data Science, and Cybersecurity aims to provide a rigorous platform for disseminating high-quality research at the intersection of intelligent systems, data-driven methodologies, and secure computing. The journal focuses on advancing theoretical foundations, practical applications, and innovative technologies in areas such as machine learning, knowledge representation, big data analytics, and information security. It seeks to foster interdisciplinary collaboration among researchers and practitioners, promote the development of robust and ethical digital solutions, and address emerging challenges in an increasingly data-centric and security-conscious world.
The scope of "Advances in Knowledge-Based Systems, Data Science, and Cybersecurity" are but not limited to:
|
Topic 1 |
Topic 2 |
Topic 3 |
Topic 4 |
Topic 5 |
Topic 6 |
|
Access control |
AI |
AI and security |
AI in industry sectors |
AI security |
AI/machine learning in security |
|
AI-supported economy |
Advanced Statistics |
Android/iOS security |
Analytics |
Anti-virus and anti-hacker measures |
Applications relating to information forensics |
|
Applied computing |
Applied cryptography |
Artificial Intelligence Security |
Auditing and Intrusion Detection |
Authentication |
Authenticated Key Agreement Protocols |
|
Authetication and Access Control |
Bayesian/probabilistic methods |
Big Data Security and Privacy |
Big data analytics |
Big data processing |
Big data technologies |
|
Biometric applications security |
Biometrics |
Blockchain |
Blockchain & Smart Contract |
Blockchain Theory and Practice |
Blockchain security |
|
Business analytics |
Business intelligence |
Cloud Security |
Cloud computing |
Cognitive interaction |
Computer crime prevention/detection |
|
Computer physical security |
Computer science and security |
Computer vision |
Compliance |
Confidentiality protection |
Content protection |
|
Critical infrastructure protection |
Criminological research |
Cryptanalysis |
Cryptographic Algorithms |
Cryptographic Hardware and Embedded Systems |
Cryptography and Cryptology |
|
Cryptography and associated topics |
Cryptography and data protection |
Cyber Governance |
Cyber Law |
Cyber attacks |
Cyber policy |
|
Cyber security |
Cyber security education |
Cyber security in Cloud |
Cyber security in Internet of Things (IoT) |
Cyber threat analysis |
Cyber threat intelligence |
|
Cyber victimology and psychopathology |
Cyber warfare |
Cybercrime |
Cybercrime laws |
Cyber–Physical System Security |
Cyber–Physical Systems |
|
Cybersecurity |
Cybersecurity and Information Security |
Cybersecurity data analytics |
Cybersecurity training and curriculum research |
DDoS attacks |
Data Science Security |
|
Data analytics |
Data base security |
Data capture and storage |
Data-driven innovation |
Data integration and privacy |
Data loss prevention (DLP) |
|
Data mining |
Data mining in healthcare |
Data mining in security |
Data visualization |
Data warehousing |
Database and data security |
|
Database Security |
Decision making |
Decision support |
Denial of service protection |
Descriptive Statistics |
Digital Forensics & Security |
|
Digital and Information Forensics |
Digital forensics |
Digital forensics and law enforcement investigation |
Digital fraud |
Digital rights |
Digital transformation |
|
Distributed file systems |
Distributed systems |
E-Business Security |
E-Health Security |
Edge computing |
Electronic commerce |
|
Electronic government |
Emerging technologies |
Emerging trends in cyber security |
Encryption |
Espionage |
Ethics in AI |
|
Evidence theory |
Expert columns |
Finance and risk analytics |
Financial fraud |
Firewalls |
Formal Methods in Information Security |
|
Formal methods in information security |
Forensic informatics |
Foundations |
Foundations of Cryptology |
Focuses on cyber conflict |
Foundational and philosophical aspects of information
security |
|
Graph analytics |
Hardware security |
High-performance computing |
Human Factors in Cyber Security |
Human Factors in Security |
Human factors and psychology |
|
Human–computer interaction |
HCI |
IDS |
IoT Security |
Identification |
Identity theft |
|
Incident forensics |
Incident Response |
Inferential Statistics |
Information ethics |
Information Hiding (Steganography, Watermarking, ...) |
Information retrieval |
|
Information science and security |
Information security |
Information systems |
Information warfare |
Infrastructure security |
Insider threats |
|
Intelligent decision support |
Intelligent information retrieval |
Intelligent processing |
Intelligent Transportation Systems (ITS) |
Internet fraud |
Internet of Things (IoT) security |
|
Internet security |
Intrusion detection |
Intrusion detection and prevention |
Intrusion detection systems and firewall |
IoT security |
IoT security trends |
|
IT Governance |
Key generation and key distribution schemes |
Knowledge discovery |
Knowledge engineering |
Knowledge graphs |
Knowledge-based systems |
|
Legal aspects of information security |
Legal frameworks |
Legal/cyber-risk/digital forensics |
Logical |
Logical and philosophical aspects of security |
Machine Learning |
|
Machine Learning in Security |
Machine learning algorithms |
Machine learning mechanisms for cyber security |
Malware |
Malware analysis |
Malware and botnet detection |
|
Marketing and retail analytics |
Methodological |
Mobility |
Modern tools for improving cyber security |
Multimedia & mobile security |
Natural Language Processing (NLP) |
|
Network Security |
Network and critical infrastructure security |
Network and Data Security |
NLP and text analytics |
Ontology |
Operating Systems Security |
|
Optimization |
OS security |
Pattern recognition |
Pervasive computing security |
Phishing |
Phishing defenses |
|
Philosophical aspects of information security |
Policies |
Policy |
Policy development |
Political and policy perspectives |
Privacy |
|
Privacy and Anonymity |
Privacy and Cyber Threat |
Privacy-enhancing technologies |
Privacy-enhancing technologies and anonymity |
Protocols |
QoS and business models |
|
Quantum Cryptography |
Quantum Security |
Quantum-safe digital signature schemes |
Quantum-safe encryption |
Quantum-safe encryption algorithms |
Quantum-safe key management mechanisms |
|
Ransomware |
Recommender systems |
Risk Management |
Risk management |
Safety-critical systems |
Scalable storage systems |
|
Secure communications technology and computer systems |
Secure end systems |
Secure operating systems |
Secure software development |
Secure Software Development / Software Security |
Security |
|
Security agents |
Security control measures, policy models and
authentication |
Security economics |
Security evaluation |
Security infrastructures |
Security issues in Intelligent Transportation Systems
(ITS) |
|
Security modelling |
Security Protocols |
Security Risk and Engineering |
Security training |
SIEM systems |
Smart cities |
|
Social and geographic dimensions of cyber offending |
Social media abuse detection |
Social media analysis |
Software and hardware security architectures |
Software protection |
Software/system security |
|
Software/hardware security |
Spoofing protection |
Statistical foundations |
Steganography and Secure Communication |
Strategy and international relations |
Strategic cyber threats |
|
Surveillance and systems applications |
Supply chain and logistics analytics |
System security |
Tamper resistant software |
Telecommunications |
Telecommunication security |
|
Text analytics |
Threat detection/protection |
Threat intelligence summaries |
Trends of crime |
Trust and safety |
Uncertainty modeling |
|
Virus/worm controls |
Vulnerabilities (Modeling, Analysis, ...) |
Web and social media analytics |
Wireless/mobile network and data security |