posted by user: Commag || 1050 views || tracked by 3 users: [display]

Cybersecurity 2024 : Cybersecurity (In Incubation)

FacebookTwitterLinkedInGoogle

Link: https://www.comsoc.org/publications/magazines/ieee-communications-magazine/cfp/cybersecurity-incubation
 
When N/A
Where IEEE Communications Magazine
Submission Deadline TBD
Categories    security   cyber   privacy   resilience
 

Call For Papers

IEEE Communications Magazine is a hybrid open access periodical. IEEE has recently signed an agreement with academic institutions in your country offering the possibility for authors affiliated to these institutions to publish in open access periodicals at no additional cost (more details at Institutional OA Agreements - IEEE Open).

https://open.ieee.org/for-institutions/institutional-partners/

Publication Date
Periodically
Series
Series in Incubation

Call for Papers

As society has become increasingly dependent on communications and networks, being an integral part of most digital systems, cybersecurity has become utmost important. While there have been many improvements, for instance within standardization and adaptation of secure network protocols, there are still many challenges to be solved within the heterogeneous and wide range of current communication systems. In addition, new technology and an evolving threat landscape pose additional challenges.

This Series covers recent advances in cybersecurity, bringing together industrial and academic research and developments. The Series emphasizes novel but practical solutions and insights of interest to industry, academia and governments. Topics of interest include cybersecurity aspects of networks and communications including, but not limited to, the following:

Critical infrastructure security
Mobile and wireless communications security
Network protocol security
Cyber attack prevention, detection, and response
Resiliency and availability in communications
Security in industrial and cyber physical systems networks/communications
Network security monitoring and traffic analysis
Network and communications privacy
Machine learning and AI for cybersecurity
Measurements of cyber security in networks and communications
Cyber threats

Submission Guidelines

Manuscripts must be submitted through the magazine’s submissions website, Manuscript Central. You will need to register and then proceed to the author center. On the manuscript details page, please select Cybersecurity Series from the drop-down menu. Manuscripts should be tutorial in nature and should not be under review for any other conference or journal. They should be written in a style comprehensible and accessible to readers outside the specialty of the article. Mathematical equations should not be used. For detailed submission guidelines please refer to the magazine website for the list of Manuscript Submission Guidelines that must be followed by all submissions to the IEEE Communications Magazine.

Papers can be submitted anytime during the year. They will receive a review process, and, if accepted, they will be published in the first slot available for this Series.

Related Resources

Security 2025   Special Issue on Recent Advances in Security, Privacy, and Trust
ASIACCS 2025   The 20th ACM ASIA Conference on Computer and Communications Security - deadline 2
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
ACNS 2025   23rd International Conference on Applied Cryptography and Network Security - deadline 2
SAI 2025   14th International Conference on Soft Computing, Artificial Intelligence and Applications
Applied Sciences (MDPI) SI:Cybersecurity 2024   Applied Sciences (MDPI) Special Issue - Cybersecurity: Advances in Security and Privacy Enhancing Technology
IJCACS 2024   International Journal of Control, Automation, Communication and Systems
ICITA 2025   19th International Conference on Information Technology and Applications
FLAIRS 2025   Florida Artificial Intelligence Research Society
Intelligent Computing-Based Time Series 2025   Intelligent Computing: Special Issue: Intelligent Computing-Based Time Series Analysis for Cybersecurity