1. Department of Computer Science, Troy University, Troy, AL, USA
2. Department of Electrical and Electronics Engineering, Marmara University, İstanbul, Turkey
Email: mesa@troy.edu (M.S.); aarteta@troy.edu (A.A.); engin.masazade@marmara.edu.tr (E.M.)
This Special Issue 2 of the International Journal of Computer Theory and Engineering (IJCTE) aims to address this pressing global issue. It solicited original, unpublished research that not only investigated cyber- and information security threats and risks but also proposed practical, cost-effective mitigation strategies. Submissions of a political or strategic nature, particularly those with the potential to endanger the safety or digital sovereignty of individuals or nations, were excluded. The overarching objective of this issue is to inspire scientifically grounded, constructive solutions to unprecedented cybersecurity challenges. Rather than surrendering to the status quo or cyber extortionists, this initiative calls for proactive academic engagement. Contributions were expected to align with one or more of the following core themes:
1) Quantitative, Qualitative, and Hybrid Risk Assessment
2) Cost-Effective Risk Management and Cost-Benefit Analysis
3) Artificial Intelligence, Machine Learning, and Deep Learning
4) Probabilistic and Deterministic Problem-Resolution Approaches
5) Cloud Computing, Edge Computing, and Sensor Systems
6) Cryptology: Cryptography and Cryptanalysis
7) Blockchain and Cryptocurrencies, and Digital Banking
8) Neural Networks and Chaos Theory
9) Hacking, Malware, Ransomware, Firewalls, Virtual Machines, Digital Signatures
10) Cybersecurity in Outer Space, Naval, and Avionic Systems
11) Electronic, Telecommunication, and Electric Power Systems
12) Applications in Healthcare, Agriculture, and Government Systems
13) Digital Infrastructure, Internet of Things (IoT), and Net Piracy
14) Cybersecurity in Banking, Finance, Telemetry, and Telemedicine
15) Security in Renewable and Conventional Power Systems
16) Water Resources, Transportation, and Education
17) Defense, Research, and Industrial Infrastructure
18) National Infrastructure Vulnerability Database Risk Assessment and Optimal Management
19) Election Systems and Judicial Correctional Facilities
20) Highway and Railroad Cybersecurity Systems
Special Issue 2 is a current collection of IJCTE journal publications [1–6] on the pivotal topic of Cybersecurity, following a modest closure of the Special Issue 1 on the then-popular COVID-19 and always mysterious and notorious Incurable Killer Diseases [7]. In chronological order from [1] to [6], the critical messages are outlined below to invite the audience to consider the articles in the archive of IJCTE. Note that the keywords from the onset have been employed partially or fully in the following six contributions addressing diverse aspects of cybersecurity:
[1, 2]: cover keywords: 1, 2, 4, 9, 17, 18
[3]: cover keywords: 5, 9
[4]: cover keywords: 4, 9
[5]: cover keywords: 5, 9
[6]: cover keywords: 6, 7, 9
[PDF]
Cite: Mehmet Sahinoglu, Alberto Arteta, and Engin Maşazade,"Editorial for the Special Issue (2024): Network and Information Security in Cyber Systems," International Journal of Computer Theory and Engineering, vol. 17, no. 2, pp. 102-103, 2025.
Copyright © 2025 by the authors. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).