• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Journals
  • /Oj
  • Home
  • / ...
  • /Journals
  • /Oj

CLOSED Call for Papers: Special Section on Cybersecurity: Privacy, Attack, and Defense

With the exponential growth of interconnected devices and computers, cyber-physical systems have experienced a significant growth of cyber-attack incidents resulting in huge property losses. Cyber-attacks, caused by malware, software vulnerabilities, privacy breaches, diverse smart attackers, etc., are undoubtedly growing matters of public concern. For example, attacks on sensors, inter-vehicle communications, and entertainment platforms can enable hackers to steal, modify, and destroy sensitive data. In more extreme cases, hackers may gain access to system controls.

Conventional security schemes alone are insufficient to safeguard networks and protect user privacy for certain applications. Moreover, current network architectures face further security concerns as they are vulnerable to new types of attacks due to the utilization of the emerging technologies, such as software-defined networking (SDN), artificial intelligence (AI), and blockchain. For example, adversarial attacks could be carried out to fool AI models through undetected malicious inputs. Therefore, innovative and pioneering defense mechanisms are urgently needed in the cybersecurity domain to ensure security and privacy for systems and users.

This special section mainly focuses on privacy, attack, and defense in cybersecurity. We solicit papers on topics including, but not limited to:

  • Privacy-preserving protocols and architectures
  • Novel provable secure cryptographic schemes and protocols
  • Lightweight cryptographic schemes and protocols
  • New methods of threat modeling
  • Privacy and security in AI and machine learning
  • Privacy and security in SDN and 5G wireless networks
  • Privacy and security in blockchain systems
  • Privacy and security in IoT
  • Design of post-quantum cryptography
  • Secure authentication and access control
  • Hardware attacks and defenses
  • Real-time intrusion detection and risk management
  • New methods for malware and software vulnerability detection

Important Dates

Submissions Due: CLOSED

Notification to Authors: 31 August 2020

Submission Guidelines

Visit the Author Information page for details on how to submit.

Guest Editors

  • Zhou Su, Xi'an Jiaotong University, China (zhousu@ieee.org)
  • Abderrahim Benslimane, University of Avignon, France (abderrahim.benslimane@univ-avignon.fr)
  • David (Bong Jun) Choi, Soongsil University, Korea (davidchoi@soongsil.ac.kr)
  • Jiliang Li, University of Gottingen, Germany (jiliang.li@informatik.uni-goettingen.de)
  • Dongfeng Fang, California Polytechnic State University, USA (dofang@calpoly.edu)

LATEST NEWS
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
CV Template
CV Template
A History of Rendering the Future with Computer Graphics & Applications
A History of Rendering the Future with Computer Graphics & Applications
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
Read Next

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter