Symmetry-adapted machine learning for information security

Research output: Contribution to journalEditorial

7 Scopus citations

Abstract

Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from industries and academic fields have presented their methodologies for supporting defense against security threats. However, these existing approaches have failed to deal with security challenges in next-generation ICT systems due to the changing behaviors of security threats and zero-day attacks, including advanced persistent threat (APT), ransomware, and supply chain attacks. The symmetry-adapted machine-learning approach can support an effective way to deal with the dynamic nature of security attacks by the extraction and analysis of data to identify hidden patterns of data. It offers the identification of unknown and new attack patterns by extracting hidden data patterns in next-generation ICT systems. Therefore, we accepted twelve articles for this Special Issue that explore the deployment of symmetry-adapted machine learning for information security in various application areas. These areas include malware classification, intrusion detection systems, image watermarking, color image watermarking, battlefield target aggregation behavior recognition models, Internet Protocol (IP) cameras, Internet of Things (IoT) security, service function chains, indoor positioning systems, and cryptoanalysis.

Original languageEnglish
Article number1044
Pages (from-to)1-4
Number of pages4
JournalSymmetry
Volume12
Issue number6
DOIs
StatePublished - Jun 2020

Keywords

  • Image watermarking
  • Indoor positioning system
  • Information security
  • Intrusion detection system
  • IoT security
  • Machine learning
  • Symmetry

Fingerprint

Dive into the research topics of 'Symmetry-adapted machine learning for information security'. Together they form a unique fingerprint.

Cite this