The CODATA Data Science Journal (DSJ) is a peer-reviewed, open access,
electronic journal, publishing papers on the management, dissemination, use and reuse of research data and databases across all research domains, including science, technology, the humanities and the arts. The scope of the journal includes descriptions of data systems, their implementations and their publication, applications, infrastructures, software, legal, reproducibility and transparency issues, the availability and usability of complex datasets, and with a particular focus on the principles, policies and practices for open data. As with all DSJ articles, submissions to this special collection will undergo a rigorous peer review process to ensure scholarly quality and relevance. Collection editors (in alphabetical order) Burçak Başbuğ Erkan, Gnana Bharathy, Paul Box, Francis P. Crawley, Mathieu Denis, Perihan Elif Ekmekci, Simon Hodson, Stefanie Kethers, Virginia Murray, Hans Pfeiffenberger, Lili Zhang Submission and dates Please review carefully the DSJ Editorial Policies and Submission Guidelines when preparing your manuscript for review. Submissions must be of high scientific quality and prepared with attention to correct English grammar and usage requirements. o Submission deadline: accepted contributions will be published on a rolling basis spread across issues of the DSJ. Submissions close on Friday 28 June 2024 o Expected publication: expect a four-week period for peer-review upon submission. Accepted papers will be published based on the DSJ issue space availability and publication schedule. For more information on the special issue, you may contact the journal editors through this link. Read moreabout Special Collection Call for Papers: Data and AI policy, systems, and tools for times of crisis Published on Dec 5, 2023 • Call for Papers: Data Science and Machine Learning for Cybersecurity Manuscript Submission Deadline: April 30, 2023 Recent changes in data science are transforming cybersecurity in a computing context. Applied science is the process of applying scientific methods, machine learning techniques, processes, and systems to data. While Cybersecurity Data Science (CSDS) enables more actionable and intelligent computing in the domain of cybersecurity as compared to traditional methods. It encompasses the rapidly growing practice of applying data science to prevent, detect, and remediate cybersecurity threats. Cybersecurity data science is a fast-developing field that uses data science techniques to address cybersecurity issues. Data-driven, statistical, and analytical methodologies are increasingly used to close security holes. It examines the healthcare, transportation, surveillance, social media, and law enforcement sectors, in order to evaluate the specific issues they pose and how they can be addressed. Cybersecurity data science is the focus of this special issue, with analytics supporting the most recent trends to optimize security solutions. The data is acquired from reliable cybersecurity sources. Using machine learning, the problem also aims to develop a multi-layered cybersecurity modeling framework. Data-driven intelligent decision-making can help defend systems against cyberattacks as we address cybersecurity data science and pertinent methodologies. o Potential topics include, but are not limited to: o Cloud-based cybersecurity analytics o Real-time IoT/endpoint-based detection o Deep learning and reinforcement learning o Human-in-the-loop cyclical machine learning o Adversarial attacks on machine learning systems o AI-driven fake news and disinformation campaigns o Cybercrime analysis, intelligence, and security o Big crime data science algorithms and open-source situational awareness o Misinformation and hate speech detection and mitigation o Data-driven cyber knowledge base development o Data Science to demonstrate cyber weakness o Robustness and interpretability in ML for security tasks
The Synergy of Scientometric Analysis and Knowledge Mapping With Topic Models Modelling The Development Trajectories of Information Security and Cyber Security Research