| |||||||||||
SI AMLCP 2024 : SPECIAL ISSUE on Advancements in Machine Learning for Cybersecurity and Privacy: Algorithms, Models, and Applications | |||||||||||
Link: https://www.degruyter.com/journal/key/comp/html | |||||||||||
| |||||||||||
Call For Papers | |||||||||||
๐ฆ๐ฃ๐๐๐๐๐ ๐๐ฆ๐ฆ๐จ๐ ๐ผ๐ป ๐๐ฑ๐๐ฎ๐ป๐ฐ๐ฒ๐บ๐ฒ๐ป๐๐ ๐ถ๐ป ๐ ๐ฎ๐ฐ๐ต๐ถ๐ป๐ฒ ๐๐ฒ๐ฎ๐ฟ๐ป๐ถ๐ป๐ด ๐ณ๐ผ๐ฟ ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฎ๐ป๐ฑ ๐ฃ๐ฟ๐ถ๐๐ฎ๐ฐ๐: ๐๐น๐ด๐ผ๐ฟ๐ถ๐๐ต๐บ๐, ๐ ๐ผ๐ฑ๐ฒ๐น๐, ๐ฎ๐ป๐ฑ ๐๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป๐
This special issue in ๐ข๐ฝ๐ฒ๐ป ๐๐ผ๐บ๐ฝ๐๐๐ฒ๐ฟ ๐ฆ๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ (๐๐ ๐ฎ๐ฌ๐ฎ๐ฎ: ๐ญ.๐ฑ) focuses on Advancements in Machine Learning for Cybersecurity and Privacy. The objective of this special issue is to showcase the latest advancements in machine learning techniques, algorithms, models, and applications that address the challenges of ensuring cyber security and privacy in the digital age. The intersection of machine learning, cyber security, and privacy is a critical area of research in today's digital landscape. By providing a dedicated platform to share and discuss advancements in this field, this special issue will foster collaboration, facilitate knowledge exchange, and inspire further research in the domains of machine learning, cyber security, and privacy. We believe that this special issue will attract a wide range of submissions from researchers and practitioners across the globe, enabling a comprehensive exploration of the advancements in machine learning for cyber security and privacy. The publication of this special issue in Open Computer Science will not only enhance the journal's reputation but also contribute significantly to the scientific community. The scope of this special issue includes, but is not limited to, the following topics: โข Novel machine learning algorithms for threat detection and anomaly detection. โข Privacy preserving machine learning techniques and models. โข Machine learning approaches for secure authentication and access control. โข Adversarial machine learning and countermeasures. โข Machine learning applications in securing Internet of Things (IoT) devices and networks. โข Deep learning models for malware detection and analysis. โข Machine learning for data protection and secure communication. Authors are requested to submit their full revised papers complying with the general scope of the journal. The submitted papers will undergo the standard peer-review process before they can be accepted. Notification of acceptance will be communicated as we progress with the review process. === ๐ฎ๐ผ๐ฌ๐บ๐ป ๐ฌ๐ซ๐ฐ๐ป๐ถ๐น๐บ Gulshan Kumar, Shaheed Bhagat Singh State University, Ferozepur (Punjab) India Krishan Kumar, Punjab University, Chandigarh, India Subhash Chander, Malout Institute of Management and Information Technology, Malout (Punjab) India Munish Kumar, Maharaja Ranjit Singh Punjab Technical University, Bathinda (Punjab) India === ๐ซ๐ฌ๐จ๐ซ๐ณ๐ฐ๐ต๐ฌ The deadline for submissions is ๐ก๐ข๐ฉ๐๐ ๐๐๐ฅ ๐ฏ๐ฌ, ๐ฎ๐ฌ๐ฎ๐ฏ, but individual papers will be reviewed and published online on an ongoing basis. === ๐ฏ๐ถ๐พ ๐ป๐ถ ๐บ๐ผ๐ฉ๐ด๐ฐ๐ป All submissions to the Special Issue must be made electronically via the online submission system Editorial Manager: ๐ต๐๐๐ฝ๐://๐๐๐.๐ฒ๐ฑ๐ถ๐๐ผ๐ฟ๐ถ๐ฎ๐น๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐ฟ.๐ฐ๐ผ๐บ/๐ผ๐ฝ๐ฒ๐ป๐ฐ๐/๐ฑ๐ฒ๐ณ๐ฎ๐๐น๐๐ฎ.๐ฎ๐๐ฝ๐ Please choose the article type โ๐๐: ๐ผ๐๐ซ๐๐ฃ๐๐๐ข๐๐ฃ๐ฉ๐จ ๐๐ฃ ๐๐๐๐๐๐ฃ๐ ๐๐๐๐ง๐ฃ๐๐ฃ๐ ๐๐ค๐ง ๐พ๐ฎ๐๐๐ง๐จ๐๐๐ช๐ง๐๐ฉ๐ฎ ๐๐ฃ๐ ๐๐ง๐๐ซ๐๐๐ฎโ. === ๐ช๐ถ๐ต๐ป๐จ๐ช๐ป ๐ผ๐ฝ๐ฒ๐ป๐ฐ๐ผ๐บ๐ฝ๐๐๐ฒ๐ฟ๐๐ฐ๐ถ๐ฒ๐ป๐ฐ๐ฒ@๐ฑ๐ฒ๐ด๐ฟ๐๐๐๐ฒ๐ฟ.๐ฐ๐ผ๐บ === ๐๐ผ๐ฟ ๐บ๐ผ๐ฟ๐ฒ ๐ถ๐ป๐ณ๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป, ๐ฝ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐๐ถ๐ ๐ผ๐๐ฟ ๐๐ฒ๐ฏ๐๐ถ๐๐ฒ. https://www.degruyter.com/journal/key/comp/html#overview |
|