Journal Information
Computers & Security
Impact Factor:

Call For Papers
Computers & Security is the most respected technical journal in the IT security field. Now in its 29th year, with a new editorial board and new regular features and columns, the journal is essential reading for IT security professionals around the world.

Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.

Subscribe today and see the benefits immediately!

• Our cutting edge research will help you secure and maintain the integrity of your systems
• We accept only the highest quality of papers ensuring that you receive the relevant and practical advice you need
• Our editorial board's collective expertise will save you from paying thousands of pounds to IT consultants
• We don't just highlight the threats, we give you the solutions
Last updated by Dou Sun in 2018-10-19
Special Issues
Special Issue on A Multidisciplinary Approach to Internet of Things Cybersecurity and Risk Management
Submission Date: 2020-01-03

Internet of Things (IoT) links physical and virtual objects by leveraging data capture and communication capabilities. Increasingly, IoT can be found in a broad range of commercial (e.g., smart and connected cities, and industry 4.0) and national security applications (e.g., critical infrastructure and Internet of Battlefield and Military Things). Due to the interconnectivity of IoT and the broader society, it is important to ensure the security of IoT and the underpinning systems. While there is no foolproof solution, we need to take a transdisciplinary approach to understand the cybersecurity risk and threat landscape, in order to formulate appropriate risk mitigation strategies. For example, How do we design more effective solutions that mitigate existing and emerging threats to IoT and the underpinning systems, such as physics attacks, sliding channels attacks, environmental attacks, cryptanalysis attacks, software attacks, and network attacks, without affecting users’ quality of experience and quality? How do we take a transdisciplinary approach to understanding the cybersecurity risk and threat landscape, and take into consideration the imperfection of cybersecurity and physical security management system in the design of the next generation cybersecurity and risk management solutions? How do we balance the need for higher level of security (and user privacy) with legitimate surveillance and lawful data access (e.g., in law enforcement investigations)? In this special issue, we will focus on cutting edge research from both academia and industry to address the above research questions, with a particular focus on multidisciplinary research. Topics of interest include, but are not limited to the below categories (however, crypto-oriented topics are beyond the scope of this journal and special issue): Cybersecurity and risk management IoT cybersecurity incident response and management Cybercrime prevention strategies, relating to IoT systems Data protection in cloud-enhanced IoT systems Physical security management of IoT systems Secure network access in IoT systems Identity management and authentication of IoT Secure edge-powered IoT design IoT trust and governance IoT secure middleware design IoT mobility security and risk management Blockchain-enabled risk management method Emerging threats to IoT Secure information integrity of IoT Other security and privacy-related issues in connected critical infrastructure Privacy Enhancing and/or preserving IoT data privacy IoT surveillance Legal issues relating to surveillance and user privacy, relating to IoT systems Transparency and accountability of IoT systems IoT forensics and anti-forensics Secure data provenance in IoT High quality survey papers on the above topics are welcome.
Last updated by Dou Sun in 2019-09-07
Related Journals
CCFFull NameImpact FactorPublisherISSN
bJournal of Computer Security IOS Press0926-227X
Computer Fraud & Security ELSEVIER1361-3723
cComputer Law and Security Review0.867ELSEVIER0267-3649
Computer Law & Security Review0.938ELSEVIER0267-3649
Computers & StructuresELSEVIER0045-7949
Computational Science and Engineering SoftwareRational Publication0000-0000
Computers in Industry2.85ELSEVIER0166-3615
Computers & Fluids2.221ELSEVIER0045-7930
Journal of Internet Security DDSecure.Net Inc.1206-4890
aIEEE Transactions on Computers1.723IEEE0018-9340
Full NameImpact FactorPublisher
Journal of Computer Security IOS Press
Computer Fraud & Security ELSEVIER
Computer Law and Security Review0.867ELSEVIER
Computer Law & Security Review0.938ELSEVIER
Computers & StructuresELSEVIER
Computational Science and Engineering SoftwareRational Publication
Computers in Industry2.85ELSEVIER
Computers & Fluids2.221ELSEVIER
Journal of Internet Security DDSecure.Net Inc.
IEEE Transactions on Computers1.723IEEE
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ccPCMPacific-Rim Conference on Multimedia2017-05-232017-07-012017-09-28
cICDF2CEAI International Conference on Digital Forensics & Cyber Crime2017-05-292017-07-202017-10-09
ba*a1NDSSAnnual Network & Distributed System Security Symposium2019-09-132019-10-312020-02-23
EDISInternational Conference on Embedded & Distributed Systems2017-10-152017-11-152017-12-17
b2MICAIMexican International Conference on Artificial Intelligence2015-06-232015-07-252015-10-25
AISIInternational Conference on Advanced Intelligent Systems and Informatics2018-05-202018-05-302018-09-01
ICIEIInternational Conference on Information and Education Innovations2019-03-202019-04-102019-07-10
ICDIPVInternational Conference on Digital Image Processing and Vision2018-05-052018-05-152018-05-26
cba2WCNCIEEE Wireless Communications & Networking Conference2019-10-042019-12-312020-04-06
cTAPIARichard Tapia Celebration of Diversity in Computing Conference  2016-09-14