Artificial Intelligence in Cybersecurity (AICS) journal, proudly associated with the esteemed portfolio of Sciences Force Publisher, stands as a distinguished platform for advancing scholarly discourse at the intersection of artificial intelligence and cybersecurity. Rooted in the realm of computer science, the journal is steadfastly committed to propelling innovative research initiatives and groundbreaking applications of artificial intelligence in the domain of cybersecurity.

Mission Statement:

At the core of our mission is the dedication to establish AICS as a leading open-access platform. We aim to provide an intellectual hub for academics, researchers, and practitioners deeply involved in the development and application of artificial intelligence solutions that significantly contribute to enhancing cybersecurity, safeguarding digital ecosystems, and fortifying resilient cyber defenses.

Scope of the Journal:

The scope of AICS is broad, covering a spectrum of themes within the realm of artificial intelligence and its applications in cybersecurity. Key areas of focus include, but are not limited to:

  • Adversarial Machine Learning
  • Deep Learning for Intrusion Detection
  • Cyber Threat Intelligence
  • Blockchain Security
  • AI-driven Malware Detection
  • Privacy-preserving AI in Cybersecurity
  • Secure Federated Learning
  • Biometric Authentication
  • Quantum Computing and Cybersecurity
  • IoT Security and AI
  • Cyber-Physical Systems Security
  • AI in Security Analytics
  • Vulnerability Assessment and Management
  • Zero Trust Security Models
  • Network Security with AI
  • Incident Response with AI
  • Explainable AI in Cybersecurity
  • AI-driven Threat Hunting
  • Risk-based Security Management
  • Authentication and Authorization with AI

Applications:

Furthermore, AICS strives to foster the integration of innovative artificial intelligence applications across diverse cybersecurity domains. The journal invites submissions showcasing novel applications with a focus on security, resilience, and originality. The diverse range of relevant applications includes (but is not limited to):

  • Unnamed Arial Vehicle
  • Autonomous Driving
  • Smart Grid Security
  • Industry 4.0
  • Security of Fog Infrastructure
  • Supply Chain Security
  • Cloud Security and Compliance
  • Internet of Nano-Things (IoNT) technologies
  • Digital Twins
  • Deepfake
  • AI-driven Security Auditing
  • Cross-domain Information Sharing
  • Cybertwin Technologies
  • AI for Security Policy Enforcement
  • Molecular Communications
  • Cybersecurity in Healthcare with AI
  • Digital Forensics with Artificial Intelligence
  • Cybersecurity in B5G Communications
  • Biological Cybersecurity with AI