Special Issue on Machine Learning, Artificial Intelligence and Data Sciences for Securing Information System

Submission Deadline: Oct. 15, 2020

This special issue currently is open for paper submission and guest editor application.

Please download to know all details of the Special Issue

Special Issue Flyer (PDF)

  • Special Issue Editor
    • Mesbaholdin Salami
      Department of Industrial Engineering, Islamic Azad University, Tehran, Iran
    Guest Editors play a significant role in a special issue. They maintain the quality of published research and enhance the special issue’s impact. If you would like to be a Guest Editor or recommend a colleague as a Guest Editor of this special issue, please Click here to fulfill the Guest Editor application.
  • Introduction

    As the use of personal computers and the rise of computer networks, followed by the Internet (the world's largest network), the lives of computers and their users have undergone major changes. In order to take advantage of the achievements and benefits of ICTs, computer users are required to adhere to specific principles and take serious care of all the factors that influence the continuity of service delivery in a computer system. Information security and computer network security are some of these components that cannot be considered individual or organization. Addressing the issue of information security and computer network security in any country requires the attention of all users, regardless of occupation and age, to the position of information security and computer network security, and this should be looked at at the macro level and in the national interest. Lack of security in computer and information networks, lack of proper training and justification of all users regardless of their occupational responsibility for the importance and importance of information security, lack of guidelines for preventing security breaches, lack of specific policies in place to deal properly and Timely security flaws will lead to issues that are harmful to all computer users in one country and in fact put the information infrastructure of a country at serious risk. To this end, data mining with artificial intelligence-based methods can help identify information holes and become intelligent in a lifelong learning process to address the security challenges of the area under investigation. Because of this, one can use artificial intelligence based methods such as neural network and meta-algorithmic algorithms etc.
    Aims and Scope:
    1. Data mining
    2. Neural network
    3. Forecasting
    4. Statistic method
    5. Wavelet
    6. Metaheuristic

  • Guidelines for Submission

    Manuscripts can be submitted until the expiry of the deadline. Submissions must be previously unpublished and may not be under consideration elsewhere.

    Papers should be formatted according to the guidelines for authors (see: http://www.mathcomputer.org/submission). By submitting your manuscripts to the special issue, you are acknowledging that you accept the rules established for publication of manuscripts, including agreement to pay the Article Processing Charges for the manuscripts. Manuscripts should be submitted electronically through the online manuscript submission system at http://www.sciencepublishinggroup.com/login. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal and will be listed together on the special issue website.

  • Published Papers

    The special issue currently is open for paper submission. Potential authors are humbly requested to submit an electronic copy of their complete manuscript by clicking here.

Browse journals by subject