posted by organizer: IEEEComputerSociety || 2377 views || tracked by 2 users: [display]

IEEE OJ-CS Special Section 2021 : Special Section on Cybersecurity: Privacy, Attack, and Defense

FacebookTwitterLinkedInGoogle

Link: https://www.computer.org/digital-library/journals/oj/call-for-papers-special-issue-on-cybersecurity-privacy-attack-and-defense?source=wiki
 
When N/A
Where N/A
Submission Deadline Jul 31, 2020
Notification Due Aug 31, 2020
Categories    privacy and security   cryptography   IOT   5g wireless networks
 

Call For Papers

With the exponential growth of interconnected devices and computers, cyber-physical systems have experienced a significant growth of cyber-attack incidents resulting in huge property losses. Cyber-attacks, caused by malware, software vulnerabilities, privacy breaches, diverse smart attackers, etc., are undoubtedly growing matters of public concern. For example, attacks on sensors, inter-vehicle communications, and entertainment platforms can enable hackers to steal, modify, and destroy sensitive data. In more extreme cases, hackers may gain access to system controls.

Conventional security schemes alone are insufficient to safeguard networks and protect user privacy for certain applications. Moreover, current network architectures face further security concerns as they are vulnerable to new types of attacks due to the utilization of the emerging technologies, such as software-defined networking (SDN), artificial intelligence (AI), and blockchain. For example, adversarial attacks could be carried out to fool AI models through undetected malicious inputs. Therefore, innovative and pioneering defense mechanisms are urgently needed in the cybersecurity domain to ensure security and privacy for systems and users.

This special section mainly focuses on privacy, attack, and defense in cybersecurity. We solicit papers on topics including, but not limited to:

Privacy-preserving protocols and architectures
Novel provable secure cryptographic schemes and protocols
Lightweight cryptographic schemes and protocols
New methods of threat modeling
Privacy and security in AI and machine learning
Privacy and security in SDN and 5G wireless networks
Privacy and security in blockchain systems
Privacy and security in IoT
Design of post-quantum cryptography
Secure authentication and access control
Hardware attacks and defenses
Real-time intrusion detection and risk management
New methods for malware and software vulnerability detection

Related Resources

CyS 2025   Call for Papers Thematic Section on Language Equity Through NLP Addressing Low-Resource Challenges under Computacion y Sistemas journal
CCS 2025   ACM Conference on Computer and Communications Security 2024 (round 2)
RECAP_OCT 2025   Research in Education Curriculum and Pedagogy: Global Perspectives (RECAP) Special Section : Curriculum Design, Student Mobility & Employability and Good Practices Call for Paper
ESORICS 2025   European Symposium on Research in Computer Security (round 2)
Encyclopaedia of Eng. Opt. & Heuristics 2025   Encyclopedia of Engineering Optimization and Heuristics (Springer)- Section: Optimization Problem Types, and Structural Optimization
CoUDP 2025   2025 International Conference on Urban Design and Planning (CoUDP 2025)
RECAP_MAY 2025   Research in Education Curriculum and Pedagogy: Global Perspectives (RECAP) Special Section: Challenges, Strategies and Good Practices in Higher Education Call for Paper
IOTCB 2025   4th International Conference on IOT, Cloud and Big Data
WSSA 67th Conference - Asian Studies 2025   The Asian Studies Section of the 67th Annual WSSA Conference is Welcoming Abstracts and Panels
IoTI5 2025   7th International Workshop on IoT Applications and Industry 5.0