Special Issue on Security and Privacy of the Behavioral Data Profiling Technique

Submission Deadline: Oct. 15, 2020

Please click the link to know more about Manuscript Preparation: http://www.ajcst.org/submission

This special issue currently is open for paper submission and guest editor application.

Please download to know all details of the Special Issue

Special Issue Flyer (PDF)
  • Lead Guest Editor
    • Salmah Mousbah Zeed Mohammed
      Department of Computer Science, Sirte University, Sirte, Libya
  • Guest Editor
    Guest Editors play a significant role in a special issue. They maintain the quality of published research and enhance the special issue’s impact. If you would like to be a Guest Editor or recommend a colleague as a Guest Editor of this special issue, please Click here to complete the Guest Editor application.
    • Mohammad Shehab
      Department of Computer Science, Aqaba University of Technology, Aqaba, Jordan
    • Azizul Rahman Mohd Shariff
      Department of Computer Science, School of Computer Science, Batu Uban, Malaysia
  • Introduction

    The rapid developments in mobile devices and communication technologies have facilitated the spread of interconnected sensors, actuators and heterogeneous devices which collect and exchange a large amount of data to offer a new class of advanced characterized by being available anywhere at any time and for anyone. In the past years, smartphones have become an indispensable component in modern society. Many of these devices rely on personal identification numbers as a form of user authentication. One of the main concerns in the use of mobile devices is the possibility of a breach in security and privacy if the device seized by an outside party. Smartphone can be easily lost due to their small size, thereby exposing details of user's private lives. Users behavior authentication is designed to overcome this problem by utilizing user behavioral technique to continuously access user identity. Accordingly, research into the security and privacy of the behavioral data profiling technique that utilizes data collected from the user behavior application to verifying the identity of the user in continuous manner.
    Aims and Scope:
    1. This special issue aims to present the most important new authentication technique
    2. Behavioral data profiling is designed in a modular manner
    3. Behavioral data profiling provides a significant improvement in the security
    4. Enable verification of the user's identity through their applications usage
    5. Security of smartphones
    6. Decision making process

  • Guidelines for Submission

    Manuscripts can be submitted until the expiry of the deadline. Submissions must be previously unpublished and may not be under consideration elsewhere.

    Papers should be formatted according to the guidelines for authors (see: http://www.ajcst.org/submission). By submitting your manuscripts to the special issue, you are acknowledging that you accept the rules established for publication of manuscripts, including agreement to pay the Article Processing Charges for the manuscripts. Manuscripts should be submitted electronically through the online manuscript submission system at http://www.sciencepublishinggroup.com/login. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal and will be listed together on the special issue website.

  • Published Papers

    The special issue currently is open for paper submission. Potential authors are humbly requested to submit an electronic copy of their complete manuscript by clicking here.