Special Issue ISSAIR 2024

Special issue for : International Conference on Information Systems Security, Artificial Intelligence, and Robotics

We are pleased to announce a Special Issue of the Journal of optimization and artificial intelligence, dedicated to the International Conference on Information Systems Security, Artificial Intelligence, and Robotics (ISSAIR 2024) https://issair.com/. This special issue aims to capture the innovative research and groundbreaking developments presented at ISSAIR 2024, held at ENSA, Ibn Tofail University in Kenitra, Morocco, on November 8-9, 2024. The conference, conducted in a hybrid mode (on-site/virtual), serves as a vital platform for leading professionals, academics, and industry experts to delve into the most pressing issues and emerging trends in cyber security, AI, and robotics.

ISSAIR 2024 is designed to foster a deeper understanding of the challenges and solutions in protecting digital infrastructure, ensuring data privacy, and integrating AI and robotics securely. The event will feature keynote presentations, panel discussions, and interactive workshops, all aimed at highlighting innovative research and practical strategies for enhancing security measures. This Special Issue will encompass selected papers from the conference, providing a comprehensive overview of the latest advancements and research contributions in these critical fields.

Conference Themes and Topics for the Special Issue

The Special Issue will cover a broad range of themes presented at ISSAIR 2024, reflecting the multifaceted nature of information systems security, AI, and robotics. We invite submissions on the following topics:

  • Security and Privacy Policies: Exploration of policies designed to protect information systems from unauthorized access and breaches.
  • AI and Machine Learning Applications in Cybersecurity: Innovations in using AI and ML to predict, detect, and respond to cyber threats.
  • Wireless, Mobile, and BYOD Security and Privacy: Challenges and solutions for securing wireless networks, mobile devices, and bring-your-own-device environments.
  • IoT Security Challenges and Solutions: Addressing security issues in the rapidly growing Internet of Things ecosystem.
  • Attacks with Novel Insights, Techniques, or Results: Studies on new types of cyber-attacks and the methods to counteract them.
  • Advanced Threat Detection and Mitigation Techniques: Cutting-edge approaches to identify and neutralize cyber threats.
  • Cyber-Physical Systems Security: Securing the integration of physical systems with cyber technologies.
  • Cybersecurity in Critical Infrastructure: Protecting vital infrastructure such as power grids, water supplies, and transportation systems from cyber threats.
  • Blockchains and Distributed Ledger Security: Enhancing the security of blockchain and other distributed ledger technologies.
  • Blockchain Technology for Security Enhancements: Leveraging blockchain to improve security protocols and systems.
  • Cloud Computing Security and Privacy: Ensuring the security and privacy of data and applications hosted in the cloud.
  • Metadata Security Management: Protecting metadata from unauthorized access and manipulation.
  • Big Data Security and Privacy: Strategies to secure large datasets and ensure their privacy.
  • Access Control and Authentication: Innovative methods for verifying user identity and controlling access to information systems.
  • Quantum Computations and Post-Quantum Cryptography: The impact of quantum computing on cryptography and the development of quantum-resistant solutions.
  • Privacy Protection and Privacy-by-Design: Incorporating privacy considerations into the design of systems and processes.
  • Human Aspects of Security and Privacy: Understanding the role of human behavior and social factors in cybersecurity.
  • Zero Trust Security Models: Implementing security models that assume no implicit trust within the network.
  • Artificial Intelligence Engineering: Advances in the engineering of AI systems for various applications.
  • Big Data Analytics Computational Intelligence: Utilizing computational intelligence techniques for big data analytics.
  • Edge Computing and IoT: Innovations in edge computing and its implications for the IoT.
  • Data Engineering: Techniques and tools for designing, building, and maintaining data systems.
  • Smart Systems Engineering: Development and security of smart systems integrating AI, IoT, and other technologies.

Submission Guidelines

Prospective authors are encouraged to submit original research papers that have not been previously submitted, published, or are currently under consideration for any other conferences or journals. All submitted papers will undergo a rigorous review process by experts in the field, evaluating them based on originality, significance, quality, and clarity.

Submission Process:

  • Authors should prepare their manuscripts according to the [Journal Name] submission guidelines.
  • Manuscripts should be submitted via the journal's online submission system.
  • All accepted and presented papers at ISSAIR 2024 will be indexed in Scopus.

Important Dates:

Submission deadline

August 30, 2024

Acceptance notification

October 15, 2024

Registration deadline

October 30, 2024

Conference date

November 8-9, 2024

Join us in this endeavor to share cutting-edge research and contribute to the global dialogue on safeguarding our digital future. We look forward to your valuable contributions to this Special Issue.

Guest Editors :

  • Prof. Dr. Habiba CHAOUI, Ibn Tofail University, Morocco
  • Prof. Dr. Salmane BOUREKKADI, Ibn Tofail University, Morocco/EFSI Sarthe France
  • Prof. Dr. Toufik MZILI, Chouaib Doukkali University, Morocco