• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Tq
  • Home
  • / ...
  • /Journals
  • /Tq

TDSC Topics

Topics include, but are not limited to, the following:

I. Design for Dependability and Security

  • Architectures
    • Fault-tolerant, secure, and safe middleware
    • Intrusion detection and tolerance
    • Firewall technologies; authentication and authorization of users, systems, and applications
    • Network technologies, including protocols, routers, and switches
    • On-line detection and recovery
  • System Management and Administration
  • Cryptography
    • Application of cryptography techniques
    • Key management
    • Cryptographic protocols and algorithms, and their security
  • Use of COTS components

II. Evaluation

  • Modeling and Prediction
    • Threat-assessment and intrusion-detection models
    • Availability, performability, and survivability
    • Intrusion tolerance; attack models
    • Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
  • Experimental Methods
    • Monitoring and measurement
    • Workload characterization
    • Benchmarking
    • Test-bed design, including fault, error, attack, and workload generation
    • Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
    • Statistical methods
  • Formal Specification and Verification
  • Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

  • Survivable Database Design and Transaction Processing
  • Electronic Commerce
  • Embedded Systems
  • File and File System Security
  • Distributed and Pervasive Systems
  • Smartcards and Biometrics
  • Real-Time Systems
  • Safety-Critical Systems (e.g., aerospace computing)
  • Internet Applications
  • Multimedia Applications and Signal-Processing

IV. Software Design

  • Operating System Support (for error/intrusion detection and/or tolerance)
  • Self-Checking Software Systems
  • Dependable, Secure Protocols and Network Interfaces
  • Software Testing, Validation, and Verification
  • Software Aging and Rejuvenation
  • Software Security and Reliability Engineering

V. New Technologies (problems and opportunities)

  • Nanoscale Computing
  • Ad Hoc Networks
  • Pervasive and Embedded Computing
  • Networks of Satellites
  • Data Mining
  • Wearable Computers and Associated Networks
  • Quantum Computing
  • Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)
LATEST NEWS
Episode 2 | Grow Your Career in Hardware Engineering
Episode 2 | Grow Your Career in Hardware Engineering
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Hariharan Rogothaman
Computing’s Top 30: Amod Agrawal
Computing’s Top 30: Amod Agrawal
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing
Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility
Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility
Read Next

Episode 2 | Grow Your Career in Hardware Engineering

Computing’s Top 30: Hariharan Rogothaman

Computing’s Top 30: Amod Agrawal

IEEE Quantum Week 2026 to Unveil the Latest in Quantum Computing

Creating the Next Generation of Connected Autonomous Systems: an Interview with Weisong Shi on Edge Computing, Autonomous Driving, and the Future of Mobility

Call for Nominations: IEEE Computer Society Opens Submissions for the “AI’s 10 to Watch” Award

Episode 1 | Interview with Michelle Tomes

Celebrating Excellence: 2025 IEEE Transactions on Mobile Computing Awards

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter