Important Deadlines:
Submission deadline: 27 April 2025
Publication: Nov/Dec 2025
Networks are often the initial target of adversaries to launch attacks. Defending networks is challenging, but even more difficult for resource-constrained networks, where the resources available for defending the network are limited by the compute and energy resources of network components. Alternatively, new attack vectors may be opened by modern network architectures, such as software-defined networks, that require new solutions.
A variety of technologies have been proposed to create, manage, and defend networks. In this special issue, we are interested in soliciting submissions that investigate the current challenges and future opportunities for defending resource-constrained networks and modern network architectures. We are particularly interested in new types of attack vectors that threaten networks and challenges in defending against such threats and methods for leveraging newer technologies, such as learning and deception. For example, in trusion detection is a challenging problem, so what can we really expect for the effectiveness of machine learning-based detection and how might such techniques be combined with traditional defenses to improve detection robustness?
We are also interested in case studies that investigate alternative perspectives in defending either resource constrained networks or modern network architectures. For example, are there opportunities for applying deception that the community is overlooking? While game theoretical methods help us reason about how defenses and deception may thwart adversarial goals, how do we connect game theory models with practical applications of deception?
In this special issue, we want to examine promising directions for securing resource-constrained networks and emerging network architectures. Emphasis will be p[aced on the more visionary submissions. Topics include, but are not limited to:
- Challenges facing conventional defenses in resource-constrained networks or modern network architectures
- Overlooked opportunities for preventing network attacks using advanced technologies, such as ML, deception, game theory, etc.
- Comparisons of effectiveness among network defenses under resource constraints
- Experience case studies in applying defenses to recent network security problems
- Impact of endpoint security on preventing network attacks
- Experimental environments for evaluating defenses for resource-constrained networks or modern network architectures
Submission Instructions:
For author information and guidelines on submission criteria, please visit the Author Information page. Please submit full papers through the IEEE Author Portal system, and be sure to select the special-issue or special-section name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the the IEEE Author Portal.
Questions?
Contact the guest editors at sp6-25@computer.org.
- Trent Jaeger, UC Riverside
- Chengyu Song, UC Riverside