Skip to main content

Emerging Technologies for Cybersecurity

Societies in today’s world are becoming more and more dependent on open networks such as the internet where commercial activities, business transactions and government services are realized. This has led to the rapid development of new cyber threats and information security issues which are utilized by cyber criminals. Mistrust of telecommunications and computer network technologies can tremendous socio-economic impacts on global enterprises as well as individuals. 

Moreover, the occurrence of international frauds often requires the investigation of facts that occur across international borders. They are also often subject to different jurisdictions and legal systems. The increased complexity of the communication and networking infrastructure is making the prevention of cyber crimes difficult increasing the demand for new approaches to cybersecurity.

Edited by: Wojciech Mazurczyk, Maciej Korczyński, Krzysztof Szczypiorski and Artur Janicki

  1. Research

    An artificial immunity approach to malware detection in a mobile platform

    Inspired by the human immune system, we explore the development of a new Multiple-Detector Set Artificial Immune System (mAIS) for the detection of mobile malware based on the information flows in Android apps...

    James Brown, Mohd Anwar and Gerry Dozier

    EURASIP Journal on Information Security 2017 2017:7

    Published on: 27 March 2017

  2. Research

    Honeypots and honeynets: issues of privacy

    Honeypots and honeynets are popular tools in the area of network security and network forensics. The deployment and usage of these tools are influenced by a number of technical and legal issues, which need to ...

    Pavol Sokol, Jakub Míšek and Martin Husák

    EURASIP Journal on Information Security 2017 2017:4

    Published on: 28 February 2017

  3. Research

    Anomaly detection through information sharing under different topologies

    Early detection of traffic anomalies in networks increases the probability of effective intervention/mitigation actions, thereby improving the stability of system function. Centralized methods of anomaly detec...

    Lazaros K. Gallos, Maciej Korczyński and Nina H. Fefferman

    EURASIP Journal on Information Security 2017 2017:5

    Published on: 28 February 2017