SecureAI aims to foster fundamental and applied research that advances the design, analysis, and deployment of secure, intelligent, and trustworthy digital systems. The journal particularly emphasizes work that integrates AI, machine learning,Internet of Things (IoT), blockchain, and big data analytics to address emerging cybersecurity challenges across domains.
The scope of the journal includes, but is not limited to, the following topics:
Artificial Intelligence and Machine Learning for Security
- AI-driven threat detection, intrusion detection, and anomaly analysis
- Adversarial machine learning and robust AI security
- Explainable and trustworthy AI for cybersecurity applications
- Automated security orchestration and response systems
IoT and Cyber-Physical System Security
- Secure architectures for IoT and edge computing
- Privacy-preserving sensing and data collection
- Security of cyber-physical systems, smart cities, and industrial IoT
- Lightweight cryptography and authentication for resource-constrained devices
Blockchain and Distributed Trust Technologies
- Blockchain-based security frameworks and protocols
- Decentralized identity, access control, and trust management
- Secure consensus mechanisms and smart contract security
- Integration of blockchain with AI and IoT systems
Big Data Analytics for Cybersecurity
- Large-scale security data analysis and threat intelligence
- Predictive analytics and risk assessment
- Data fusion and visualization for security decision-making
- Secure data sharing and privacy-enhancing technologies
Systems, Applications, and Policy
- Secure architectures for cloud, edge, and distributed systems
- AI-enabled security in finance, healthcare, energy, and critical infrastructure
- Ethical, legal, and governance aspects of AI-driven security
- Standards, benchmarks, and best practices for secure intelligent systems
SecureAI welcomes original research articles, reviews, perspectives, and methodological studies that demonstrate strong technical depth, interdisciplinary relevance, and clear implications for future secure digital ecosystems.


