CLOSED Call for Papers: Special Issue on AI for Cybersecurity and Cybersecurity for AI

Share this on:
Submissions Due: 15 September 2023

Important Dates

    • Submissions Deadline: 15 September, 2023
    • Notification of first Review: 15 November, 2023
    • Submission of Revised Manuscript: 15 January, 2024
    • Notification of Final Decision: 28 February, 2024

Publication: Late 2024


In the past decades, cybersecurity vulnerabilities and threats have been among the most  significant challenges for social development resulting in financial loss, violation of privacy,  damages to infrastructures, and many more. Organizations, governments, and cyber  practitioners tend to leverage state-of-the-art Artificial Intelligence (AI) technologies to analyze,  prevent, and protect their data and services against cyber threats and attacks. Due to the  complexity and heterogeneity of security systems, cybersecurity researchers and practitioners  have shown increasing interest in applying AI methods to mitigate cyber risks in many security  areas, such as malware detection and essential player identification in an underground forum.  On the other hand, adversaries may use AI for offensive purposes, making it difficult to defend  against the attacks. For example, adversaries may target and attack AI algorithms deployed in  critical functions and services by organizations, and successful attacks may cause more severe  consequences, as mentioned above. Therefore, to protect the cyber world, we need more  effective and efficient AI algorithms and tools capable of automatically and intelligently analyzing and classifying the massive amount of data in complex cybersecurity scenarios while protecting these AI algorithms from interference, compromise, or misuse. 

Scope of the Special Issue 

We believe this special issue will give a timely collection of research updates to benefit the  researchers and practitioners working in improving cybersecurity and safety for artificial  intelligence. 

Topics of interest include but are not limited to: 

  • AI applications for cybersecurity 
  • Data-driven cybersecurity innovation 
  • Modelling and simulation of cyber systems and system components 
  • AI approaches to make cyber systems secure and resilient 
  • Human behaviour models with application to cybersecurity 
  • AI tools and techniques, mental resilience, and cybersecurity 
  • AI for cybersecurity software verification and validation 
  • Automation of heterogeneous security tools 
  • Decision making with uncertainty in cyber systems 
  • Security and privacy 

We are interested in the new applications of AI for cybersecurity and Cybersecurity for AI.  Submitted papers will be evaluated based on criteria such as technical originality, creativity, and  applicability. Methodological topics of interest include, but are not limited to:

  •  Graph convolution networks and graph attention networks 
  • Interpretable deep learning 
  • Real-time and/or streaming deep learning 
  • Multi-view deep learning paradigms 
  • Deep adversarial learning (e.g., generative adversarial networks) 
  • Deep transfer learning 
  • Deep Bayesian learning
  • Deep reinforcement learning 

Application areas of interest include, but are not limited to: 

  • Malware evasion and detection 
  • IP reputation services 
  • Event correlation and anomaly detection 
  • Internet of Things (IoT) analysis (e.g., fingerprinting, network telescopes, etc.) Threat modelling (e.g., mapping exploits to MITRE ATT&CK) 
  • Security data fusion (e.g., event correlation) across multiple data sources Cybersecurity information sharing and automation 
  • Smart and large-scale vulnerability assessment and management systems Security Intelligence Augmentation (e.g., human-in-the-loop systems) Dark Web Analytics for CTI applications 
  • Vulnerability detection 

Submission Guidelines

For author information and guidelines on submission criteria, please visit the TDSC’s Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Contact the guest editors: