About the Journal
Journal Name : ADS Data and Cyber Security
About the Journal
ADS Data and Cyber Security is a double-blind, peer-reviewed, and open-access scholarly journal dedicated to publishing high-quality research, reviews, and applied studies in the rapidly evolving domains of data protection, cybersecurity, and information assurance. The journal serves as a platform for advancing theoretical frameworks, practical solutions, and innovative technologies that secure digital assets, protect privacy, and safeguard organizational infrastructures against cyber threats.
The journal maintains a rigorous double-blind peer review process, ensuring that both author and reviewer identities remain confidential to guarantee impartiality and academic integrity. As an open-access publication, ADS Data and Cyber Security provides unrestricted access to its content, allowing researchers, professionals, policymakers, and industry experts worldwide to benefit from the latest insights and developments in the field.
Adhering to the ethical publishing principles outlined by the Committee on Publication Ethics (COPE), the journal ensures transparency, originality, and the highest scholarly standards. It welcomes contributions from academia, industry, government agencies, and independent researchers, fostering an inclusive community dedicated to advancing knowledge in data security and cybersecurity.
Aim and Scope
Aim
The primary aim of ADS Data and Cyber Security is to promote research that strengthens the security, resilience, and ethical governance of digital systems and data assets. The journal seeks to bridge the gap between academic inquiry, industry practices, and policymaking in the fields of cybersecurity, data privacy, and cyber resilience.
Scope
The scope of the journal includes, but is not limited to, the following topics:
- Cybersecurity Fundamentals– Security models, risk assessment, and defense strategies.
- Data Protection & Privacy– Privacy-enhancing technologies, encryption, and compliance with data protection laws.
- Network & Infrastructure Security– Securing wired and wireless networks, cloud systems, and IoT ecosystems.
- Cyber Threat Intelligence– Threat modeling, incident detection, and threat-hunting techniques.
- Digital Forensics & Incident Response– Evidence gathering, forensic tools, and post-incident analysis.
- Blockchain Security– Consensus mechanisms, smart contract vulnerabilities, and decentralized security solutions.
- Artificial Intelligence in Cybersecurity– AI-based intrusion detection, anomaly detection, and predictive threat analysis.
- Cloud & Edge Security– Virtualization risks, secure cloud architectures, and distributed edge protections.
- Critical Infrastructure Security– Safeguarding energy, transportation, healthcare, and financial systems.
- Cyber Law & Policy– Legal frameworks, governance models, and cyber ethics.
- Security Awareness & Education– Human factors, training programs, and cybersecurity culture.
- Emerging Threats & Future Challenges– Post-quantum cryptography, zero-trust security, and advanced persistent threats.