• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Su
  • Home
  • / ...
  • /Journals
  • /Su

CLOSED Call for Papers: Special Issue on Sustainable Defense and Security Systems

IEEE TSUSC seeks submissions for this upcoming special issue.

Important Dates

Submissions Due: 31 December 2022

Publication: October–December 2023 (tentative)


As the world is getting more and more connected, cyber-attacks are becoming more sophisticated. Research in cyber security lies at the center of the prosperity of any nation. To address security threats to network infrastructure devices and sensitive data, many different solutions capable of providing a suitable degree of security capability have been proposed. However, such solutions have not been properly designed to address an important aspect, sustainability. In this context, sustainability refers to the ability to maintain or support a process continuously over time by improving computational requirements, scalability, energy efficiency and resource usage of defense and security systems. This special issue thus aims to explore recent advances in model development, new techniques and/or novel observations for improving cyber security with particular focus on secure systems’ sustainability. We also seek contributions motivated by taking real-world cyber security problems and theoretical works that have clear intention for practical applications in sustainable defense and security systems. 

Topics of interest include (but are not limited to):

  • Sustainability in AI-based security solutions
  • Optimised, data-driven security solutions
  • Forecasting cyber events with limited data
  • Model sustainability enhancement (such as feature engineering, data manipulation, neural network design and multimodal learning)
  • LLML-based security solutions
  • Energy-efficient security monitoring, tracking and detection/prevention systems (e.g., running fewer CPU/GPU cycles, reduces memory usage, and consumes less energy leading to run on a smaller computing device)
  • Energy aware programming security systems, algorithms and applications
  • Optimised, big data applications in cyber security and threat intelligence
  • Energy efficient scheduling and resource management for security systems 
  • Efficient information sharing and data protection 
  • Energy efficient models of large-scale security applications
  • Lightweight cryptographic protocols for IoT security and privacy
  • Lightweight security tools for IoT devices 
  • State-of-the-art reviews on sustainable information security
  • Energy aware HPC applications for security
  • Sustainable cyber security in IoT, smart grids, and modern networks
  • Power aware applications for cyber security and threat intelligence
  • Sustainability issues in blockchain technologies
  • Sustainability in autonomous vehicle security solutions
  • Sustainability issues and opportunities in cyber security and threat intelligence


Submission Guidelines

For author information and guidelines on submission criteria, please visit the TSUSC's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Email the guest editors at paul.d.yoo@ieee.org and  zahir.tari@rmit.edu.au

Guest Editors:

  • Dr. Paul Yoo, Deputy Director of Birkbeck Institute for Data Analytics, Chair for Threat Intelligence Lab, Birkbeck College, University of London, United Kingdom.
  • Prof. Zahir Tari, Research Director, Centre for Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, Australia.

LATEST NEWS
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Read Next

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

The AI Adoption Gap: Why Enterprise AI Fails After Deployment

Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces

From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains

An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter