
Special Issue "Cybersecurity and Critical Infrastructures: During and after the Era of COVID-19 Pandemic" https://www.mdpi.com/journal/applsci/special_issues/Cybersecurity_Critical_I... Dear Colleagues, Critical National Infrastructures (CNIs) are vital assets for public safety, economic welfare and the national security of countries. Vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. Moreover, during the COVID-19 crisis, the workforce is being encouraged to continue teleworking while most products and services have become available over the web. Phishing emails, social engineering attacks, malware, ransomware, spyware, medical-related scams and investment opportunity fraud are only a few examples of the cybercrime incidents reported during the COVID-19 crisis period. As Critical National Infrastructures are becoming more vulnerable to cyber attacks, their protection becomes a significant issue for any organization as well as any nation. The risks to continued operations from failing to upgrade aging infrastructure, or not meeting mandated regulatory regimes, are considered higher given the demonstrable impact of such circumstances. Due to the rapid increase in sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cyber security of CNIs has become an agenda item for academics, practitioners and policy makers. A holistic view that covers technical, policy, human and behavioral aspects is essential to effectively handle the cyber security of critical infrastructures. Moreover, the ability to attribute cyber attacks is a vital element of avoiding impunity in cyberspace. In this Special Issue, both research and practical aspects of cyber security considerations in critical infrastructures are of interest. Aligned with the interdisciplinary nature of cyber security, authors from academia, governments and industry are welcome to contribute. We seek original and high-quality submissions on, but not limited to, one or more of the following topics: - Security of the smart grid - Security of supervisory control and data acquisition (SCADA) systems - Cyber security of complex and distributed critical infrastructures - Cyber security of industrial control systems - Cyber security modeling and simulation - Cyber threat modeling and analysis - Safety–security interactions - Cyber security engineering - Behavioral modeling - Network security and protocols - Security, privacy and legal issues of big data and the Internet of Things - Cyber threat intelligence - Situational awareness - Attack modeling, prevention, mitigation and defense - Cyber–physical system security approaches and algorithms - Critical infrastructure security policies, standards and regulations - Vulnerability and risk assessment methodologies for distributed critical infrastructures - Risk management and cyber insurance - Simulation and test beds for the security evaluation of critical infrastructures Dr. Leandros Maglaras Prof. Dr. Helge Janicke Dr. Mohamed Amine Ferrag *Guest Editors* Keywords - security of the smart grid - security of supervisory control and data acquisition (scada) systems - cyber security of complex and distributed critical infrastructures - cyber security of industrial control systems - cyber security modeling and simulation - cyber threat modeling and analysis - safety–security interactions - cyber security engineering - behavioral modeling - network security and protocols - security, privacy and legal issues of big data and the Internet of Things - cyber threat intelligence - situational awareness - attack modeling, prevention, mitigation and defense - cyber–physical system security approaches and algorithms - critical infrastructure security policies, standards and regulations - vulnerability and risk assessment methodologies for distributed critical infrastructures - risk management and cyber insurance - simulation and test beds for the security evaluation of critical infrastructures - resiliency and security of cyber systems - cyber security and privacy policy - hardware security solutions - incident response - encryption, authentication, availability assurance - human awareness and training - intrusion detection - trust and privacy - secure communication protocols - malware analysis - attribution of cyber attacks - cyber warfare, peacekeeping - hybrid war - cybercrime - COVID-19 pandemic - coronavirus -- _________________________________________________________________________ *Dr. Mohamed Amine Ferrag* Associate Professor (PhD, Habilitation) Department of Computer Science Guelma University, BP 401 Guelma 24000, Algeria Tel. : +213 661 87 30 51 E-mails: mohamed.amine.ferrag@gmail.com / ferrag.mohamedamine@univ-guelma.dz Homepage : https://sites.google.com/site/mohamedamineferrag/