Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Top

Junior Editorial Board

  • Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, MI, USA./Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, Egypt.
    Research Interests: Meta-heuristic algorithms; Operation research; Game theory; Non-linear optimization; Statistics and data Analysis; Linear optimization; Machine learning; Multiobjective optimization
  • School of Computing, Edinburgh Napier University, Edinburgh, UK.
    Research Interests: Cybersecurity; Multimedia encryption; Machine learning; Application of chaos theory in cybersecurity
  • School of Science, Edith Cowan University, Perth, Australia.
    Research Interests: Cyber security; Data analytics; Machine learning; Big data; Edge computing; Blockchain; Healthcare; Drones
  • Department of Network and Computer Security, State University of New York Polytechnic Institute, Utica, NY, USA.
    Research Interests: Computer vision; Machine learning; Pattern recognition with applications to biometrics; Cybersecurity; Affect recognition; Image and video processing; Perceptual-based audiovisual multimedia quality assessment
  • School of Information Technology, Deakin University, Geelong, Australia.
    Research Interests: Cyber security; Artificial intelligence; IoT; Critical infrastructure security
  • School of Cyber Engineering, Xidian University, Xi'an, Shaanxi, China.
    Research Interests: Next generation wireless network and security
  • Department of Computer and Information Sciences, Fordham University, New York, NY, USA.
    Research Interests: Security and resilience; Cyber-physical systems; Smart grids; Game and decision theory; Complex networks; Artificial intelligence
  • Software Engineering Institute, East China Normal University, Shanghai, China.
    Research Interests: Garbled circuits; Secret sharing; Homomorphic encryption; Privacy preservation; Federated learning; Blockchain
  • College of Information Technology, Soongsil University, Seoul, South Korea.
    Research Interests: Distributed intelligence; Internet of things; Mobile security; Infrastructure security; Distributed security; Smart grid
  • Department of Computer Science, James Madison University, Harrisonburg, VA, USA.
    Research Interests: Incentive mechanism design in internet of things (IoT); Game theory; Data analytics; Algorithm design & analysis; Computer science education
  • Department of Digitalization, Copenhagen Business School, Copenhagen, Denmark
    Research Interests: Cyber security; Cryptography; Machine learning; Blockchain
  • Infineon Technologies Austria AG, Graz, Austria.
    Research Interests: Security and safety for internet of things; Cyber physical systems; Blockchain applications
  • School of Computing and Information Science, Anglia Ruskin University, Cambridge, UK.
    Research Interests: Cyber security risk management; Threat intelligence; Vulnerability assessment; AI enabled cyber security; Incident response; Business continuity; Information security audit and assurance
  • Department of Computing, Macquarie University, Sydney, Australia.
    Research Interests: Cyber security; IoT security; Human-in-the-loop CPS security; Cryptography; AI and machine learning for cyber security
  • Department of Computer and Information Technology, Purdue University, West Lafayette, IN, USA.
    Research Interests: Digital forensics; Forensic intelligence; Cybersecurity; User and data privacy; Artificial intelligence in security; Privacy and forensics applications
  • Arijit Karati
    Department of Computer Science and Engineering, National Sun Yat-Sen University, Kaohsiung, Taiwan.
    Research Interests: Applied cryptography; Information security; Edge security; Automotive security; Decentralized data privacy
  • Computer Science Department, University of Illinois at Urbana-Champaign, Urbana, IL, USA.
    Research Interests: Artificial intelligence; Security and privacy
  • Department of Computer and Information Sciences, Florida A&M University, Tallahassee, FL, USA.
    Research Interests: Cloud computing and cloud sorage; Machine learning and data mining; Cybersecurity; Big data; Network science (e.g.; Social networks; Wireless networks); Health care; IoT; HPC
  • Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou, Zhejiang, China.
    Research Interests: Cyber security; Machine learning; IoT security; Cyber-physical systems; Smart grids; Evolutionary algorithm
  • Department of Electrical Engineering and Information Technology, University of Napoli Federico II, Naples, Italy.
    Research Interests: Computer networks; Traffic analysis; Machine learning; Deep learning; Explainable artificial intelligence
  • Department of Math and Computer Science, University of Missouri-St. Louis, St. Louis, MO, USA.
    Research Interests: Networking; Mobile security; Mobile computing; Protocol design; Information centric networking; Ubiquitous computing; Opportunistic networks; Social networks; Mobility models
  • School of Computer Science and Engineering, University of New South Wales, Sydney, Australia.
    Research Interests: Decentralised software systems; Blockchains; Cyber security; Digital identity management
  • School of Architecture, Technology and Engineering, University of Brighton, Brighton, UK.
    Research Interests: Cyber threat intelligence (CTI); Artificial intelligence (AI) for cyber security; Threat modeling; Security requirements engineering
  • Research Institute CODE, University of Federal Armed Forces Munich, Neubiberg, Germany.
    Research Interests: Security; Privacy; Trusted communication in the field of IoT; Mobile communication
  • School of Cryptology, University of Chinese Academy of Sciences, Beijing, China.
    Research Interests: Information security; Cryptography
  • Centre for Research & Technology Hellas/Information Technologies Institute (CERTH/ITI), Thessaloniki, Greece.
    Research Interests: Multimedia analysis and retrieval; Multimodal fusion; Computer vision; Multimodal analytics; Artificial intelligence; Environmental and security applications
  • Department of Computer Science, City University of Hong Kong, Hong Kong, China.
    Research Interests: Information security; Blockchain
  • Global Big Data Technologies Centre, University of Technology Sydney, Sydney, Australia.
    Research Interests: Blockchain modeling; Design; Security and privacy; IoT security; Vehicle security and privacy
  • Department of Control Science and Engineering, Harbin Institute of Technology,Harbin, Heilongjiang, China.
    Research Interests: Reinforcement learning; Security and safety of cyber-physical systems; Intelligent control of nonlinear systems
  • Center for Applied Mathematics, Tianjin University, China
    Research Interests: Edge Computing; Internet of Things; Artificial intelligence; Security and Privacy; Complex Networks
  • Fujian Provincial Key Laboratory of Network Security and Cryptology,College of Computers and Cyber Security, Fujian Normal University, Fuzhou, P. R. China
    Research Interests: Big data security and privacy protection; data security for connected autonomous vehicles; Artificial intelligence security
  • Department of Computer Science,City University of Hong Kong, Hong Kong, China
    Research Interests: Applied cryptography; Privacy-preserving machine learning; Deep learning security and privacy
  • Department of Software Systems and Cybersecurity, Monash University, Melbourne, Australia.
    Research Interests: Data security and privacy; Secure networked system; Machine learning security and privacy; Decentralised system and application; Confidential computing
  • Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands.
    Research Interests: Data protection; Information security; Formal methods for security, Data analytic for security; Social engineering
close
© 2016-2023 OAE Publishing Inc., except certain content provided by third parties