Journal Information
IEEE Security & Privacy
https://www.computer.org/csdl/magazine/sp
Impact Factor:
2.900
Publisher:
IEEE
ISSN:
1540-7993
Viewed:
22342
Tracked:
39
Call For Papers
IEEE Security & Privacy (S&P)’s mission is to be the best source of reliable, useful, peer-reviewed information for those aiming to understand how systems, data, and people are protected in a world of rapid technology evolution. This bimonthly magazine publishes articles that have clarity and context, targeting a wide audience who understand technology, from developers to executives, managers to policy-makers, and researchers interested in problems with practical impact. Peer-reviewed articles and columns by real-world experts illuminate all aspects of the field, including systems, attacks and defenses, software security, applied cryptography, usability, forensics, big data, ethics, biometrics, and more, with special issues focusing on targeted topics as well as issues devoted to key events and conferences.

S&P is copublished by the IEEE Computer Society and the IEEE Reliability Society. Technical cosponsors are the IEEE Signal Processing Society and IEEE Engineering in Medicine & Biology Society. S&P accepts commercial and classified advertisements. S&P‘s 2023 impact factor is 2.9. Learn about the magazine’s history by exploring the S&P index site, curated by a volunteer.

S&P aims to provide a unique combination of research articles, case studies, tutorials, and departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership. Topics include, but are not limited to:

    Network Security
    Software and Hardware Security
    Systems Security
    Embedded Security
    Privacy-Enhancing Technologies
    Data Analytics for Security and Privacy
    Usable Security and Privacy
    Physical and Human Security
    Wireless and Mobile Security
    Security Foundations
    Security Economics
    Security and Privacy Policies
    Integrated Security Design Methods
    Critical Infrastructures
    Sociotechnical Security and Privacy
    Social Networks and Computing
    Surveillance
    Cybercrime and Forensics
    Developer and User Training
    Real-World Cryptography
    Intrusion Detection
    Malware

Scope

IEEE Security & Privacy is the premier magazine of the IEEE Computer and Reliability Societies for informing their members about recent and forthcoming advances in information technology pertaining to security, privacy, and dependability. The magazine seeks creative and novel perspectives on industry practices, research directions, and policy and regulatory matters. In addition to feature articles, special and themed issues, columns, and departments, experts from our community of interest provide insightful commentary on current issues and paradigm shifts via virtual roundtables and podcasts.

In particular, IEEE Security & Privacy looks for articles that identify key research problems for improving computing defenses and for developing more secure and privacy-aware systems, as well as articles that teach readers about emerging technologies that show promise in such areas. IEEE Security & Privacy encompasses a broad range of topics regarding security and privacy and features both peer-reviewed articles as well as departments and columns, which describe perspectives on hot topics from academic and industry leaders in the field.
Last updated by Dou Sun in 2024-07-28
Special Issues
Special Issue on Cybersecurity and Privacy in Global Conflict and Disaster Regions
Submission Date: 2024-10-14

Electronic surveillance and cyberattacks are used in occupied conflict regions by aggressors to monitor, cut off communications, intimidate, disrupt, or target [3]. Cyberatttacks are also levied across borders against countries, their populations, and institutions [4], as well as against the United Nations [5] and international, non-governmental organizations (NGOs) providing humanitarian aid [6,7,8,9]. And, attackers are known to take advantage of individuals in vulnerable situations following major natural disasters, such as hurricanes, floods, and wildfires [10]. This Special Issue of IEEE Security & Privacy on “Cybersecurity and Privacy in Global Conflict and Disaster Regions” solicits articles on topics related to the aforementioned situations, including threats, mitigations, policies, and future directions. To better convey scope, a few examples of articles published in other venues that demonstrate desired scope of this Special Issue include (but are not limited to): Jessica McClearn and Rikke Bjerg Jensen, and Reem Talhouk. Othered, Silenced and Scapegoated: Understanding the Situated Security of Marginalised Populations in Lebanon. Proceedings of the 32nd USENIX Security Symposium, pp. 4625–4642, 2023. Dimitrios Serpanos and Theodoros Komninos. The Cyberwarfare in Ukraine. Computer, 55(7):88-91, IEEE, July 2022. Martin Husák, Martin Laštovička, and Tomáš Plesník. 2022. Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice, 3(3):17, ACM, September 2022. Kasra EdalatNejad, Wouter Lueks, Justinas Sukaitis, Vincent Graf Narbel, Massimo Marelli, Carmela Troncoso. Janus: Safe Biometric Deduplication for Humanitarian Aid Distribution. Proceedings of the IEEE Symposium on Security and Privacy, 2024. Rakesh Verma, Devin Crane, and Omprakash Gnawali. Phishing during and after disaster: Hurricane Harvey. Proceedings of Resilience Week, pp. 88-94. 2018. Submitted articles should focus on facts and emphasize technical or scientific aspects (including human factors) of cybersecurity and privacy, or threats to cybersecurity and privacy, in global conflict and disaster regions. We encourage a broad and unbiased exploration and discussion of various threats, mitigations, and situations. Pieces focusing on important topics such as social media, mis/disinformation and generative AI are only in scope insofar as those pieces tie strongly to cybersecurity and privacy. Not in scope for this issue include articles that are opinion pieces or political in nature. When in doubt about scope, prospective authors should please recall traditional themes of cybersecurity and privacy conference and journal venues.
Last updated by Dou Sun in 2024-07-28
Special Issue on Gender and Sexuality in Online Safety
Submission Date: 2024-12-16

A growing body of research in security and privacy focuses on threats and defenses that intersect with gender and sexuality (both sexual identity and sexual behavior or abuse). Existing research on threats includes a focus on digitally mediated intimate partner violence, image-based sexual abuse, and online hate & harassment. Existing research on defenses includes work on help-seeking, clinical computer security, nudity, and grooming detection as well as work on how some defenses (e.g., client-side scanning) threaten rights to free expression via secure communication. This special issue calls for original empirical research results and commentary focused on gender and sexuality as lenses through which to investigate emerging issues in security and privacy. Incorporating and building on individual approaches, sociotechnical and societal perspectives of gender and sexuality can improve efforts to promote security and privacy for all people. We embrace work that wrestles with difficult challenges in this space such as the balance between mitigating harm and protecting sexual expression; how to define safety in the intersection of gender and sexuality; and navigating the incentives, abilities, or responsibilities of diverse stakeholders to establish enduring safety. We welcome pieces that provoke discussion, inspire new research agendas, systematize existing bodies of knowledge, critique existing approaches, and/or offer original case studies or research on the following topics: Gender and sexuality (both sexual identity and sexual behavior or abuse) in relation to online safety (and privacy and security) Feminist, queer, and critical theory within online safety research Novel research methods, approaches or design perspectives that center gender and sexuality in online safety (and privacy and security) research Research ethics and responsibility when conducting online safety research in relation to gender and sexuality Technical and socio-technical mechanisms to mitigate gendered and sexuality-related online safety harms Consideration of emerging technologies including AI generation, AR/VR, and haptics from a gender and sexuality perspective Behaviors, attitudes, perceptions, stereotypes, needs, or threat models related to (1) marginalization or privilege by gender or sexual identity and/or (2) situational risk or behavior as a result of gender or sexuality (e.g., in relation to intimate content) Policy related to any of the above, e.g., the U.K.’s Online Safety Act, the EU’s Digital Services Act, Australia’s Online Safety Act, Canada’s Bill-63 – Online Harms Act, the U.S.’s Executive Order on AI Safety or Call to Action on Non-Consensual Intimate Imagery
Last updated by Dou Sun in 2024-07-28
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
ICICN'International Conference on Information, Communication and Networks2024-04-252024-05-252024-08-21
BIOSEInternational Conference on Bioscience & Engineering2023-07-292023-08-052022-06-25
RoboComInternational Workshop on Communication and Networking for Swarms Robotics2024-10-062024-10-212025-01-10
ICANInternational Conference on Computing, Analytics and Networks2019-10-052019-11-152020-02-07
HealthSecUSENIX Workshop on Health Security and Privacy 2012-05-222012-08-06
AIPR'Applied Imagery Pattern Recognition2021-08-15 2021-10-12
WUWNetACM International Conference on Underwater Networks & Systems2023-08-152023-09-152023-11-24
IMSMInternational Conference on Industrial Manufacturing and Structural Materials2024-01-19 2024-03-15
bIWSECInternational Workshop on Security2019-04-022019-05-272019-08-28
ICEMAInternational Conference on Energy Materials and Applications2022-02-102022-03-012022-05-05
Recommendation