Journal Information
Computers & Security
http://www.journals.elsevier.com/computers-and-security/
Impact Factor:
3.062
Publisher:
Elsevier
ISSN:
0167-4048
Viewed:
15587
Tracked:
66

Call For Papers
Computers & Security is the most respected technical journal in the IT security field. Now in its 29th year, with a new editorial board and new regular features and columns, the journal is essential reading for IT security professionals around the world.

Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.

Subscribe today and see the benefits immediately!

• Our cutting edge research will help you secure and maintain the integrity of your systems
• We accept only the highest quality of papers ensuring that you receive the relevant and practical advice you need
• Our editorial board's collective expertise will save you from paying thousands of pounds to IT consultants
• We don't just highlight the threats, we give you the solutions
Last updated by Dou Sun in 2019-11-24
Special Issues
Special Issue on Zero-trust security in cloud computing environments (CCE)
Submission Date: 2021-02-01

The emerging zero trust security shows great promises of vastly enhanced security, usability, data protection and governance in cloud computing environments, which assumes that all participants, systems, or services operating from within the cloud-based perimeter are not trusted by default and instead must verify everything trying to access the cloud-based system. In cloud-based system, the traditional perimeter security approaches are vulnerable for data breaches and cyberattacks. The zero-trust model provides new security model that requires restrict access control and trusts nothing by default for any user, applications, or services in both inside and outside a cloud-based system perimeter. The zero trust specifically effect in cloud computing environment, where enterprises should not inherently trust any users, application, and any attempt to access a system or application must be verified before granting access. The zero-trust security model can significantly improve the security of cloud by creates a map of what it has in the cloud and implement strong access control, including multi-factor authentication, adaptive access control, risk-based adaptive authentication, artificial intelligence enabled dynamic security policies, and more. The aim of this special issue is to foster novel and multidisciplinary approaches that improve the security in cloud environments by addressing challenges in zero trust security in cloud environments, including fitting with legacy network-centric methods, strengthening security of user and application centric approaches, supporting access to internal apps from any device anywhere, etc. This special issue will focus on (but not limited to) the following topics: Zero trust methods and models for cloud security solutions Zero trust architecture in cloud computing Zero trust security architecture/framework in cloud computing Micro-segmentation in cloud systems Autonomic security for zero trust cloud-based systems Real-time access control and optimisation Granular perimeter security Multifactor authentication in zero trust model Governance policies in cloud computing Zero trust identity management multi-factor authentication (MFA) Access privilege in zero trust enabled cloud environments Cyberattacks in zero trust environments Granular access control and security Implementation of zero trust security in cloud computing Machine learning enabled zero trust security in cloud computing
Last updated by Dou Sun in 2020-11-02
Special Issue on Cybersecurity Incident Response in Organizations
Submission Date: 2021-05-01

The evolving cyber-threat landscape has given rise to new and increasingly potent attacks against organizations. Human attackers use sophisticated tools and techniques to disrupt and destroy cyber infrastructures, deny organizations access to IT services, and steal sensitive information including Intellectual Property, trade secrets and customer data. Incident response takes place under considerable time pressure in a dynamic and rapidly changing environment with high levels of information load, information diversity and task uncertainty. Effective response requires command, control and coordination of diverse teams of organizational stakeholders as they develop situation awareness, adapt to the rapidly evolving situation, raise the necessary resources, and respond to threats. The practice of incident response is a relatively under-studied area of research. The purpose of this special issue is to collect and disseminate the latest advances in this area for a broad audience. We seek submissions that study the real-world problem of incident response and contribute sound practical advice to industry. Papers could employ qualitative, quantitative, mixed-methods and design science techniques. Exploratory case studies and action research are welcome. Topics of interest include (but are not limited to): In-depth and revelatory case studies of incident response practice in organizations Maturity models of incident response Novel conceptualizations of the practice of incident response (e.g. response agility, communication and coordination, organizational learning, knowledge sharing, sense-making, situation awareness, process improvement) Management of the incident response function (e.g. strategy, policy, risk, training) Adoption of novel technologies for incident response (e.g. data-fusion and real-time analytics)
Last updated by Dou Sun in 2020-11-15
Related Journals
CCFFull NameImpact FactorPublisherISSN
bJournal of Computer Security IOS Press0926-227X
Computer Fraud & Security Elsevier1361-3723
cComputer Law and Security Review1.552Elsevier0267-3649
Computer Law & Security Review1.552Elsevier0267-3649
Computers & Structures3.354Elsevier0045-7949
cBehaviour & Information Technology1.388Taylor & Francis0144-929X
Computers in Industry4.769Elsevier0166-3615
Journal of CybersecurityOxford University Press2057-2093
Computers & Fluids2.223Elsevier0045-7930
Journal of Internet Security DDSecure.Net Inc.1206-4890
Full NameImpact FactorPublisher
Journal of Computer Security IOS Press
Computer Fraud & Security Elsevier
Computer Law and Security Review1.552Elsevier
Computer Law & Security Review1.552Elsevier
Computers & Structures3.354Elsevier
Behaviour & Information Technology1.388Taylor & Francis
Computers in Industry4.769Elsevier
Journal of CybersecurityOxford University Press
Computers & Fluids2.223Elsevier
Journal of Internet Security DDSecure.Net Inc.
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
aa*a1EurocryptInternational Conference on the Theory and Applications of Cryptographic Techniques2020-10-082021-01-252021-05-02
ccPCMPacific-Rim Conference on Multimedia2017-05-232017-07-012017-09-28
cREFSQRequirements Engineering: Foundation for Software Quality2020-11-09 2021-04-12
ba*a1NDSSAnnual Network & Distributed System Security Symposium2020-07-312020-10-232021-02-21
NLPIInternational Conference on NLP & Information Retrieval2021-01-102021-02-052021-02-20
ICPSIEEE International Conference on Industrial Cyber-Physical Systems2020-01-202020-03-312020-06-09
CMSPInternational Conference on Multimedia and Signal Processing2013-05-152013-05-202013-09-20
AISOInternational Conference on Artificial Intelligence and Soft Computing2020-10-112020-10-152020-10-24
TVXACM International Conference on Interactive Experiences for Television and Online Video2019-02-012019-03-112019-06-05
AmIEuropean Conference on Ambient Intelligence2019-07-192019-08-122019-11-13
Recommendation