• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Journals
  • /Su
  • Home
  • / ...
  • /Journals
  • /Su

CLOSED Call for Papers: Special Issue on Sustainable Defense and Security Systems

IEEE TSUSC seeks submissions for this upcoming special issue.

Important Dates

Submissions Due: 31 December 2022

Publication: October–December 2023 (tentative)


As the world is getting more and more connected, cyber-attacks are becoming more sophisticated. Research in cyber security lies at the center of the prosperity of any nation. To address security threats to network infrastructure devices and sensitive data, many different solutions capable of providing a suitable degree of security capability have been proposed. However, such solutions have not been properly designed to address an important aspect, sustainability. In this context, sustainability refers to the ability to maintain or support a process continuously over time by improving computational requirements, scalability, energy efficiency and resource usage of defense and security systems. This special issue thus aims to explore recent advances in model development, new techniques and/or novel observations for improving cyber security with particular focus on secure systems’ sustainability. We also seek contributions motivated by taking real-world cyber security problems and theoretical works that have clear intention for practical applications in sustainable defense and security systems. 

Topics of interest include (but are not limited to):

  • Sustainability in AI-based security solutions
  • Optimised, data-driven security solutions
  • Forecasting cyber events with limited data
  • Model sustainability enhancement (such as feature engineering, data manipulation, neural network design and multimodal learning)
  • LLML-based security solutions
  • Energy-efficient security monitoring, tracking and detection/prevention systems (e.g., running fewer CPU/GPU cycles, reduces memory usage, and consumes less energy leading to run on a smaller computing device)
  • Energy aware programming security systems, algorithms and applications
  • Optimised, big data applications in cyber security and threat intelligence
  • Energy efficient scheduling and resource management for security systems 
  • Efficient information sharing and data protection 
  • Energy efficient models of large-scale security applications
  • Lightweight cryptographic protocols for IoT security and privacy
  • Lightweight security tools for IoT devices 
  • State-of-the-art reviews on sustainable information security
  • Energy aware HPC applications for security
  • Sustainable cyber security in IoT, smart grids, and modern networks
  • Power aware applications for cyber security and threat intelligence
  • Sustainability issues in blockchain technologies
  • Sustainability in autonomous vehicle security solutions
  • Sustainability issues and opportunities in cyber security and threat intelligence


Submission Guidelines

For author information and guidelines on submission criteria, please visit the TSUSC's Author Information page. Please submit papers through the ScholarOne system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the ScholarOne portal.


Questions?

Email the guest editors at paul.d.yoo@ieee.org and  zahir.tari@rmit.edu.au

Guest Editors:

  • Dr. Paul Yoo, Deputy Director of Birkbeck Institute for Data Analytics, Chair for Threat Intelligence Lab, Birkbeck College, University of London, United Kingdom.
  • Prof. Zahir Tari, Research Director, Centre for Cyber Security Research and Innovation, School of Computing Technologies, RMIT University, Melbourne, Australia.

LATEST NEWS
CV Template
CV Template
A History of Rendering the Future with Computer Graphics & Applications
A History of Rendering the Future with Computer Graphics & Applications
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
AI Assisted Identity Threat Detection and Zero Trust Access Enforcement
Resume Template
Resume Template
IEEE Reveals 2026 Predictions for Top Technology Trends 
IEEE Reveals 2026 Predictions for Top Technology Trends 
Read Next

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

IEEE Reveals 2026 Predictions for Top Technology Trends 

7 Best Practices for Secure Software Engineering in 2026

Muzeeb Mohammad: IEEE Computer Society Leader in Cloud Tech

Setting the Standard: How SWEBOK Helps Organizations Build Reliable and Future-Ready Teams

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter