eScripts is currently undergoing an upgrade and heavy maintenance that may cause instability to the service and unsolicited emails going out to users in the upcoming few days. We apologize for any inconvenience that his may cause you and we appreciate your understanding as we continue to improve your experience.
If you encounter significant issues with eScripts, please let us know at publications@eai.eu.

Security and Safety

Editorial Board
Editors in Chief:
  • Sencun Zhu (Penn State University)
Area Editors:
  • Giampaolo Bella (Università di Catania)
  • Arosha Bandara (The Open University)
  • Mohamed Amine Ferrag (Department of Computer Science, Guelma University)+ BioDr. Mohamed Amine Ferrag received the Bachelor's degree (June, 2008), Master's degree (June, 2010) and Ph.D. degree (June, 2014) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science. Since October 2014, he is an assistant professor at the Department of Computer Science, Guelma University, Algeria. He is also affiliated as a Researcher member (Since October 2010) with Networks and Systems Laboratory – LRS, Badji Mokhtar – Annaba University, Algeria. His research interests include wireless network security, network coding security, and applied cryptography. He has been conducting several research projects with international collaborations on these topics. Mohamed Amine Ferrag participated in many international conferences worldwide, and has been granted short-term research visitor internships to many renown universities including, De Montfort University, UK. He is currently serving on various editorial positions such as Editorial Board Member in Journals (Indexed SCI & Scopus) such as, IET Networks, International Journal of Internet Technology and Secured Transactions (Inderscience Publishers), EAI Endorsed Transactions on Security and Safety (EAI), International Journal of Web Services Research (IJWSR) (IGI Global), and International Journal on Semantic Web and Information Systems (IJSWIS) (IGI Global).
  • Tiago Cruz (University of Coimbra)
  • Andrew Crampton (University of Huddersfield)
  • Thomas Brandstetter (University St. Poelten)
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Martin Boldt (Blekinge Institute of Technology)+ BioI’m a PhD in computer science at Blekinge Institute of Technology in Sweden. As a member of the Department of Computer Science and Engineering my main research focus is in Information Security and Computational Criminology, which are approached using various methods from the interdisciplinary field of Data Science. Currently I’m working in two interesting research projects. The first project is funded by the Knowledge Foundation during 2014-2020 and is titled Scalable resource-efficient systems for big data analytics. In this project I’m invovled in studies regarding unsupervised methods for anomaly detection as well as e-mail content to experts mappings. The second project is together with the Swedish Police and the Swedish National Forensic Centre. This project focuses on the mitigation of serial volume crime, in particular residential burglaries, using data-driven methods.
  • Heng Zhang (Western Sydney University)
  • Sokratis Katsikas (Norwegian University of Science and Technology)
  • Hamed Taherdoost (Research Club / Research and Development Department | Hamta Group / Hamta Business Solution Sdn Bhd)+ BioHamed Taherdoost holds a PhD in computer science from Universiti Teknologi Malaysia, MSc in information security, and BSc in the science of power electricity. With over 17 years of experience in both industry and academia, Hamed has established himself as an industry leader in the fields of Management and Information System. Hamed specializes in business management and information technology management. He started his career in 2001 as an electrical designer and programmer in Tablokar, a leading switchgear panel manufacturer in the Middle East. He has subsequently worked in IT transformation, systems analysis, and user experience analysis, and has held positions as varied as Business Manager, Project Manager, Executive Manager, CITO, CBO, CTO and CEO at international companies from Cyprus, the UK, Belize, Iran, and Malaysia such as at HAMTA GROUP | Hamta Business Solution Sdn Bhd, at an IT company, Beshnas Technology Sdn Bhd, at Ahoora Ltd, a management consultation group, and at Simurgh Pvt, an international trade company. Aside from his experience in industry, he also has numerous outstanding achievements in academia. Hamed has authored over 120 scientific articles in peer-reviewed international journals and conference proceedings, as well as six books. His academic employment started in 2009 when he became a lecturer at IAU and Payam Noor University. Moreover, he serves as an advisory board member and reviewer for many international journals and has organized and chaired numerous conferences and conference sessions respectively. Currently, he is the Team Leader & Supervisor of Research Club and Hamta Academy, Malaysia, Advisory Board of Cambridge Scholars Publishing, UK and Scientific Board of Nan Yang Academy of Sciences (NASS), Singapore. He is a Senior Member of the IEEE, Member of British Science Association, Sales Management Association, Production and Operations Management Society, American Association for Science and Technology, Scientific and Technical Research Association, IEEE Cybersecurity, Cyber Ethics and Cyber Peace, IEEE Blockchain Community, IFIP TC 11 Working Group and many other professional bodies. Particularly, he has completed Associate in Project Management (CAPM), Information Systems Auditor (CISA), Certified Ethical Hacker (CEH), Information Security Manager (CISM), PMI Risk Management Professional, Project Management Professional (PMP), Computer Hacking Forensic Investigator (CHFI) and Certified Information Systems (CIS), courses. His research and industry knowledge areas are Management of Information System, Technology Acceptance Models and Frameworks, Information Security, Information Technology Management, Web Service Quality and Security, Performance Evaluation, Project Management, Business Management, Leadership, Manufacturing Strategies, Business and Research Proposal Development, International Business, IT/IS Management, Multi-Criteria Decision Analysis (TOPSIS, Analytic Network Process, Analytical Hierarchy Process and SMART), Business Analysis and Market Research, User Acceptance Testing and Web Project Management.
  • Simon Parkinson (University of Huddersfield)
  • Simona Bernardi (University of Zaragoza)
  • Kaiqi Xiong (University of South Florida)
Scope

Growing threats and increasingly also failures due to complexity may compromise the security and resilience of network and service infrastructures. Applications and services require security of data handling and we need new security architectures and scalable and interoperable security policies for this. There is a need to guarantee end-to-end security in data communications and storage, including identity management and authentication.

Moreover, we need technology to enable network security monitoring and tracing and to assess the trustworthiness of infrastructures and services. It must ensure the protection of personal data and privacy and to properly assign liability and risks, together with the appropriate governance models needed to do so. Furthermore this is applied to the settings of Public Safety in general.

Topics
Keywords
Security of cyber-physical systems, Public safety in cyber-physical systems, Privacy, Identity theft protection, Security/risk management, Policies intellectual Property protection, Trustworthy computing, Forensics, Network and infrastructure security, Information security, Formal method and protocol verification, Cloud computing security, Software and system security, Internet of things security, Blockchain Security, Mobile and wireless security, Healthcare security, Applied Cryptography, Machine learning and AI related security