• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Su
  • Home
  • / ...
  • /Journals
  • /Su

CLOSED Call for Papers: Special Issue on Sustainable Defense and Security Systems

IEEE TSUSC seeks submissions for this upcoming special issue.

Important Dates

Submissions Due: 31 December 2022

Publication: October–December 2023 (tentative)


As the world is getting more and more connected, cyber-attacks are becoming more sophisticated. Research in cyber security lies at the center of the prosperity of any nation. To address security threats to network infrastructure devices and sensitive data, many different solutions capable of providing a suitable degree of security capability have been proposed. However, such solutions have not been properly designed to address an important aspect, sustainability. In this context, sustainability refers to the ability to maintain or support a process continuously over time by improving computational requirements, scalability, energy efficiency and resource usage of defense and security systems. This special issue thus aims to explore recent advances in model development, new techniques and/or novel observations for improving cyber security with particular focus on secure systems’ sustainability. We also seek contributions motivated by taking real-world cyber security problems and theoretical works that have clear intention for practical applications in sustainable defense and security systems. 

Topics of interest include (but are not limited to):

  • Sustainability in AI-based security solutions
  • Optimised, data-driven security solutions
  • Forecasting cyber events with limited data
  • Model sustainability enhancement (such as feature engineering, data manipulation, neural network design and multimodal learning)
  • LLML-based security solutions
  • Energy-efficient security monitoring, tracking and detection/prevention systems (e.g., running fewer CPU/GPU cycles, reduces memory usage, and consumes less energy leading to run on a smaller computing device)
  • Energy aware programming security systems, algorithms and applications
  • Optimised, big data applications in cyber security and threat intelligence
  • Energy efficient scheduling and resource management for security systems 
  • Efficient information sharing and data protection 
  • Energy efficient models of large-scale security applications
  • Lightweight cryptographic protocols for IoT security and privacy
  • Lightweight security tools for IoT devices 
  • State-of-the-art reviews on sustainable information security
  • Energy aware HPC applications for security
  • Sustainable cyber security in IoT, smart grids, and modern networks
  • Power aware applications for cyber security and threat intelligence
  • Sustainability issues in blockchain technologies
  • Sustainability in autonomous vehicle security solutions
  • Sustainability issues and opportunities in cyber security and threat intelligence


Submission Guidelines

For author information and guidelines on submission criteria, please visit the TSUSC's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Email the guest editors at paul.d.yoo@ieee.org and  zahir.tari@rmit.edu.au

Guest Editors:

  • Dr. Paul Yoo, Deputy Director of Birkbeck Institute for Data Analytics, Chair for Threat Intelligence Lab, Birkbeck College, University of London, United Kingdom.
  • Prof. Zahir Tari, Research Director, Centre for Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, Australia.

LATEST NEWS
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
From Legacy to Cloud-Native: Engineering for Reliability at Scale
From Legacy to Cloud-Native: Engineering for Reliability at Scale
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
IEEE Computer Society Announces 2026 Class of Fellows
IEEE Computer Society Announces 2026 Class of Fellows
Read Next

Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

IEEE Computer Society Announces 2026 Class of Fellows

MicroLED Photonic Interconnects for AI Servers

Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award

Empowering Communities Through Digital Literacy: Impact Across Lebanon

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter