IT Security and Critical Infrastructure Protection
Submission Deadline: CLOSED
Publication: July/August 2013
This special issue of IT Professional seeks to provide readers an overview of and insights into current topics in cybersecurity. We are looking for high-quality contributions from industry, government, business, and academia that present state-of-the-art theories and techniques, showcase successfully deployed applications, or demonstrate challenging research issues. Topics of interest include (but are not limited to) the following themes:
- Attacks and defenses
- Authentication and access control
- Cloud and distributed system security
- Computer forensics
- Embedded systems security
- Intrusion detection
- Mobile app security
- Network security
- Security and privacy policies
- Security architectures
- Usability issues in security
- Web application security
This topic list is not meant to be exhaustive, and IT Pro welcomes articles on all aspects of computer security and privacy for this issue.
Feature articles should be no longer than 4,200 words (with tables and figures each counting as 300 words) and have no more than 20 references. Illustrations are welcome. For author guidelines, including sample articles see http://www.computer.org/portal/web/peerreviewmagazines/acitpro.
Submit your article at https://mc.manuscriptcentral.com/itpro-cs.
For further information contact the Guest Editors:
- Wes Chou, US Dept of Defense
- Morris Chang, Iowa State University
- Richard Kuhn, NIST
- Linda Wilbanks, US Dept of Education