Special Issue on Machine Learning, Artificial Intelligence and Data Sciences for Securing Information System

Submission Deadline: Feb. 25, 2020

Please click the link to know more about Manuscript Preparation: http://www.mathcomputer.org/submission

This special issue currently is open for paper submission and guest editor application.

Please download to know all details of the Special Issue

Special Issue Flyer (PDF)
  • Lead Guest Editor
    • Arshad Ahmad Khan Mohammad
      Department of Computer Science and Engineering, GITAM University, Hyderabad, India
  • Guest Editor
    Guest Editors play a significant role in a special issue. They maintain the quality of published research and enhance the special issue’s impact. If you would like to be a Guest Editor or recommend a colleague as a Guest Editor of this special issue, please Click here to complete the Guest Editor application.
    • Amairullah khan Lodhi
      Department of Electronics and Communication Engineering, SHADAN College of Engineering and Technology, Hyderabad, India
    • Syed Abdul Sattar
      Department of Electronics and Communication Engineering, Nawab Shah Alam Khan College of Engineering & Technology, Hyderabad, India
    • Mohammed Ali Hussain
      Department of Electronics and Computer Science Engineering, K L University, Guntur, India
    • Abdul Bari
      Department of Computer Science and Engineering, ISL Engineering College, Hyderabad, India
    • Mazher Khan
      Department of Electronics & Telecommunication Engineering, Maharashtra Institute of Technology, Aurangabad, India
    • Abdul Razzak
      Department of Electronics and Communication Engineering, Innovative Technologies, Hyderabad, India
    • Arif Mohammad Abdul
      Department of Computer Science and Engineering, GITAM University, Hyderabad, India
    • Raj Mohammed Mohd
      Department of Computer Science and Engineering, GITAM University, Hyderabad, India
    • Shaista Sabir
      Department of Computer and Software Engineering, College of Electric and Mechanical Engineering, National University of Science and Technology, Sialkot, Pakistan
    • Somdip Dey
      School of Computer Science and Electronic Engineering, University of Essex, Colchester, UK
    • Khalil ur Rehman
      College of Software Engineering, Beijing University of Technology, Beijing, China
    • Mohamad Zamini
      Department of IT, Tarbiat Modares University, Tehran, Iran
    • Masood Ahmad Mahammad
      Assistant Professor, Electronics and Communication Engg, GITAM Deemed To be University, Hyderabad, Telangana, India
    • Mohammad Arshad
      Mazoon College, Affiliated with Missouri University of Science and Technology (USA) and Purdue University Northwest (USA)., Muscat, Oman
    • Mohammed Mahmood Ali
      Department of Cse, Muffakham jah college of engineering & Technology (Osmania University), Hyderabad, India
  • Introduction

    The importance of computing devices and their connectivity has become mandatory in our daily life. The connectivity of computing devices has been achieving by various networking technologies based on the applications. The security is major concern for computing devices as well as networking technologies. The suitable controls and preventions must be applied to detect and remove the security attacks. Every day new types of attacks are arising and causing the potential damage to the information system.
    The technologies such as machine learning, artificial intelligence and data sciences have been used to mitigate the security attacks in the information system. However, it is important to investigate and analyze these technologies accuracy and cost for securing the information system. Moreover, the shortcoming of these technologies for securing the information system needs to be highlighted. It is therefore important to find out the success of these technologies in comparison with traditional information security mechanisms.
    The special issue on machine learning, artificial intelligence and data sciences for securing information system is aimed at academic and industrial researchers to apply these technologies to secure the information system and prevent the security attacks. The key areas of this Special Issue includes, but are not limited to:
    1. Computer network and information security
    2. Machine learning and information security
    3. Artificial intelligence and information security
    4. Data sciences and information security
    5. Cyber security
    Aims and Scope:
    1. Information Security
    2. Cyber Security
    3. Machine Learning
    4. Artificial Intelligence
    5. Data Sciences
    6. Intrusion Detection

  • Guidelines for Submission

    Manuscripts can be submitted until the expiry of the deadline. Submissions must be previously unpublished and may not be under consideration elsewhere.

    Papers should be formatted according to the guidelines for authors (see: http://www.mathcomputer.org/submission). By submitting your manuscripts to the special issue, you are acknowledging that you accept the rules established for publication of manuscripts, including agreement to pay the Article Processing Charges for the manuscripts. Manuscripts should be submitted electronically through the online manuscript submission system at http://www.sciencepublishinggroup.com/login. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal and will be listed together on the special issue website.

  • Published Papers

    The special issue currently is open for paper submission. Potential authors are humbly requested to submit an electronic copy of their complete manuscript by clicking here.