International Journal of Sensors and Sensor Networks

Special Issue

Cyber Security Issues and Challenges

  • Submission Deadline: 2 June 2024
  • Status: Open for Submission
  • Lead Guest Editor: Khalid Hussain
About This Special Issue
Cybersecurity is the protection of internet-connected devices and services from malicious attacks by hackers, spammers, and other cybercriminals. With the increasing number of users, devices, and programs in the modern enterprise, combined with the increased deluge of data, the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further. Cybersecurity is continually challenged by hackers, data loss, privacy, risk management, and changing cybersecurity strategies. The cyber threat landscape is constantly evolving as IT architectures change and cybercriminals develop new tools and techniques. Managing corporate cybersecurity risk requires designing and deploying defenses against the latest risks. Some of the biggest cybersecurity challenges that companies will face in 2023 include comprehensive threat protection, round-the-clock monitoring, access to up-to-date threat intelligence, and providing comprehensive coverage and protection for all potential attack vectors. Cybersecurity is essential in today's digital world, and one single security breach can lead to exposing the personal information of millions of people.
The primary goal of cybersecurity is to ensure secure storage, control access, and prevent unauthorized processing, transfer, or deletion of data. It safeguards the confidentiality, integrity, and availability of information. The ultimate goal of cybersecurity is to protect the information from being stolen or compromised. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
Through this special issue, we aim to, welcome researchers from various disciplines to provide interdisciplinary perspectives our contributions will play a crucial role in advancing knowledge in this field.

Potential topics include, but are not limited to:

  1. Zero-Day vulnerabilities: Research on discovering, analyzing, and mitigating zero-day vulnerabilities, which are unknown and unpatched security flaws that can be exploited by attackers
  2. Machine learning for intrusion detection: Exploring the use of machine learning algorithms for improving intrusion detection systems, including anomaly detection and behavioral analysis
  3. IoT security: Investigating security challenges in the Internet of Things (IoT) ecosystem, including securing connected devices, data privacy, and network resilience
  4. Cloud security: Research on securing cloud computing environments, including data protection, access control, and compliance in cloud services
  5. Threat intelligence and information sharing: Studying how organizations can effectively gather threat intelligence, share information, and collaborate to defend against cyber threats
  6. Blockchain and cryptocurrency security: Examining security issues related to blockchain technology, smart contracts, and the use of cryptocurrencies, including fraud prevention and privacy concerns
  7. Cyber-physical systems security: Investigating security challenges in cyber-physical systems, including autonomous vehicles, industrial control systems, and smart grids
Lead Guest Editor
  • Khalid Hussain

    Department of Computing and Informatics, Albukhary International University, Alor Setar Kedah Darul Aman, Malaysia

Guest Editors
  • Basheer Riskhan

    Department of Copmputing and Informatics, Albukhary International Univeristy , Alor Setar Kedah Darul Aman, Malaysia

  • Syed Jawad Hussain

    Department of Computer Science, Sir Syed CASE Institute of Technology, Islamabad, Pakistan

  • Noor Zaman Jhanjhi

    Department of Computing, Taylor’s University, Selangor, Selangor, Malaysia

  • Faiz Shah

    Department of Business and Social Science, Albukhary International University, Alor Setar Kedah, Malaysia

  • Halawati Abd Jalil Safuan

    Department of Business and Social Science, Albukhary International University, Alor Setar Kedah, Malaysia

Manuscript Submission

Submitting your research to special issue is a simple and efficient process. Here are three submission options available:

Option 1: Quick Submission

Our Quick Submission tool provides a fast and uncomplicated way for you to submit your manuscripts.

Selected Special Issue:*
Special Issue Title Article Processing Charge
Cyber Security Issues and Challenges 770 USD
Article Title: *
Upload Manuscript:*

Upload your manuscript (Max 20MB, .doc, .docx, .tex)

Article Type: *
First Name:*
Last Name:*
Email Address:*

We will respond within 3 working days.

Captcha: *
Option 2: Online Submission

Submit your manuscript via our online submission system.

For unregistered users, please register at
For registered users, please log in at

Once you're logged in, click on "Submit to Special Issue" under the "Submissions" section. Follow the system prompts to successfully complete the submission.

Option 3: Email Submission

You can submit your manuscript directly via email to

Please type "Cyber Security Issues and Challenges Manuscript Submission" as the subject of your email.