eScripts is currently undergoing an upgrade and heavy maintenance that may cause instability to the service and unsolicited emails going out to users in the upcoming few days. We apologize for any inconvenience that his may cause you and we appreciate your understanding as we continue to improve your experience.
If you encounter significant issues with eScripts, please let us know at publications@eai.eu.

Security and Safety

Editorial Board
Editors in Chief:
  • Leandros Maglaras (De Montfort University)+ BioDr. Leandros Maglaras is a Electrical and Computer engineer with diverse Technical Background (Hardware reliability, wireless technology and Software) in combination with Industrial Management and Telecommunication Studies which provides him with a broad and mature view of technical issues. He is participating in various research programs investigating vehicular and ICT technologies (reduction-project.eu), sustainable development (islepact.eu) and optimization and prediction of the dielectric behavior of air gaps (optithesi.webs.com). He has published several papers and is a student member of IEEE.
  • Sencun Zhu (Penn State University)
Special Issue Editors:
  • Kevin Jones (Airbus Group)
Area Editors:
  • Giampaolo Bella (Università di Catania)
  • Arosha Bandara (The Open University)
  • Dimitrios Katsaros (University of Thessaly)
  • Mohamed Amine Ferrag (Department of Computer Science, Guelma University)
  • Tiago Cruz (University of Coimbra)
  • Andrew Crampton (University of Huddersfield)
  • Thomas Brandstetter (University St. Poelten)
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Shujun Li (University of Kent)+ BioSee my personal website: http://www.hooklee.com
  • Martin Boldt (Blekinge Institute of Technology)+ BioI’m a PhD in computer science at Blekinge Institute of Technology in Sweden. As a member of the Department of Computer Science and Engineering my main research focus is in Information Security and Computational Criminology, which are approached using various methods from the interdisciplinary field of Data Science. Currently I’m working in two interesting research projects. The first project is funded by the Knowledge Foundation during 2014-2020 and is titled Scalable resource-efficient systems for big data analytics. In this project I’m invovled in studies regarding unsupervised methods for anomaly detection as well as e-mail content to experts mappings. The second project is together with the Swedish Police and the Swedish National Forensic Centre. This project focuses on the mitigation of serial volume crime, in particular residential burglaries, using data-driven methods.
  • Heng Zhang (Western Sydney University)
  • Sokratis Katsikas (Norwegian University of Science and Technology)
  • Mohammed Atiquzzaman (University of Oklahoma, USA)
  • Hamed Taherdoost (Research and Development Department | Hamta Business Solution Sdn Bhd)
  • Simon Parkinson (University of Huddersfield)
  • Simona Bernardi (University of Zaragoza)
  • Kaiqi Xiong (University of South Florida)
Scope

Growing threats and increasingly also failures due to complexity may compromise the security and resilience of network and service infrastructures. Applications and services require security of data handling and we need new security architectures and scalable and interoperable security policies for this. There is a need to guarantee end-to-end security in data communications and storage, including identity management and authentication.

Moreover, we need technology to enable network security monitoring and tracing and to assess the trustworthiness of infrastructures and services. It must ensure the protection of personal data and privacy and to properly assign liability and risks, together with the appropriate governance models needed to do so. Furthermore this is applied to the settings of Public Safety in general.

Topics
Keywords
Security of cyber-physical systems, Public safety in cyber-physical systems, Privacy, Identity theft protection, Security/risk management, Policies intellectual Property protection, Trustworthy computing, Forensics, Network and infrastructure security, Information security, Formal method and protocol verification, Cloud computing security, Software and system security, Internet of things security, Blockchain Security, Mobile and wireless security, Healthcare security, Applied Cryptography, Machine learning and AI related security