+91 7682 015 542       info@gexinonline.com

  • Account
    • Sign In
      • Author
      • Editor
      • Reviewer
    • Sign Up
      • Author
logo
  • Home
  • Open Access
  • About Us
    • About Us
    • Our Team
  • Journal
  • Submission
    • Submit Manuscript
    • Instructions to Authors
    • Review Process
    • Join As Reviewers
    • Our Reviewers
  • Policies & Ethics
    • Open Access Policy
    • Editorial Policy
    • Conflict of Interest
    • Publication Ethics and Malpractice Statement
    • Plagiarism Policy
    • Review Policy
    • Correction, Retraction, Withdrawal Policies
    • Digital Preservation Policy
    • Waiver Policy
    • Complaints Policy
    • Advertising Policy
    • Data Sharing Policy
    • Policy on Statement of Informed Consent
    • Policy on Ethics of Human and Animal Experimentation
  • Contact Us
  • About the Journal
  • Editorial Board
  • Review Process
  • Author Guidelines
  • Article Processing Charges
  • Special Issues
  • Current Issue
  • Past Issue
Journal of Information Technology and Integrity

Special Issue "Advances Techniques for Cybersecurity: Issues and Challenges"

Special Issue Editors

Prof. Elisabetta Zuanelli

Department of management-computing sciences School of Economy and Finance, University of Rome "Tor Vergata", Italy

Interests: Contrastive analysis: phonology and phonetics; error analysis of communication; theories of communication; communication skills; educational sociolinguistics; multilingual minority languages; pragmalinguistics; institutional public communication; normative communication; digital communication; semiotics of interface design, technology architectures, elearning; intelligent platforms and digital services; search engines development research; multidisciplinary approaches to e-content / IT infomation security; AI modelling; iconic syntax and indexing; cybersecurity ontologies.


Dr. Rashi Saxena

Computer Science & Engg. Dept, KL University, India

Interests: Cloud computing, Blockchain, Cybersecurity

Special Issue Information

A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In today’s connected world, everyone benefits from advanced cyber security programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies.

Potential topics include but are not limited to the following:

Cloud security posture management, The importance of network security, The importance of end-user education, Cloud security posture management, An overview of cyber security’s research areas, Security breaches of remote working, Cybersecurity standards for automotive, Privacy settings of social media accounts, The influence of remote work on a firm’s, Big data and the rise of internet crimes, Compare and analyze different hacking collectives, Evaluating how antimalware operate to prevent cyber attacks, The biggest cyber security threats in the world today, Importance of software updates in cyber security, Demystifying white and black hat hackers, Analyzing the most difficult part in cyber security administration, Anomalous communion detection systems, Cyber security and blockchain, Reverse engineering.

LICENSE

This work is licensed under a Creative Commons Attribution 4.0 International License.

Quick Links

  • Open Access
  • About Us
  • Journal
  • Submit Manuscript
  • Copyright & Licensing Policy

Contact Us

  • Plot No. - 814/1775, Jayar Sasan, Bhubaneswar, Odisha, India, Pin - 752101
  • +91 7682 015 542
  • info@gexinonline.com
MEMBER OF
JOURNAL ARCHIVED IN

© Gexin Publications.

All Rights Reserved.