• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Journals
  • /Tq
  • Home
  • / ...
  • /Journals
  • /Tq

TDSC Topics

Topics include, but are not limited to, the following:

I. Design for Dependability and Security

  • Architectures
    • Fault-tolerant, secure, and safe middleware
    • Intrusion detection and tolerance
    • Firewall technologies; authentication and authorization of users, systems, and applications
    • Network technologies, including protocols, routers, and switches
    • On-line detection and recovery
  • System Management and Administration
  • Cryptography
    • Application of cryptography techniques
    • Key management
    • Cryptographic protocols and algorithms, and their security
  • Use of COTS components

II. Evaluation

  • Modeling and Prediction
    • Threat-assessment and intrusion-detection models
    • Availability, performability, and survivability
    • Intrusion tolerance; attack models
    • Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
  • Experimental Methods
    • Monitoring and measurement
    • Workload characterization
    • Benchmarking
    • Test-bed design, including fault, error, attack, and workload generation
    • Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
    • Statistical methods
  • Formal Specification and Verification
  • Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

  • Survivable Database Design and Transaction Processing
  • Electronic Commerce
  • Embedded Systems
  • File and File System Security
  • Distributed and Pervasive Systems
  • Smartcards and Biometrics
  • Real-Time Systems
  • Safety-Critical Systems (e.g., aerospace computing)
  • Internet Applications
  • Multimedia Applications and Signal-Processing

IV. Software Design

  • Operating System Support (for error/intrusion detection and/or tolerance)
  • Self-Checking Software Systems
  • Dependable, Secure Protocols and Network Interfaces
  • Software Testing, Validation, and Verification
  • Software Aging and Rejuvenation
  • Software Security and Reliability Engineering

V. New Technologies (problems and opportunities)

  • Nanoscale Computing
  • Ad Hoc Networks
  • Pervasive and Embedded Computing
  • Networks of Satellites
  • Data Mining
  • Wearable Computers and Associated Networks
  • Quantum Computing
  • Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)
LATEST NEWS
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Automating Compliance in Life Sciences for Real-Time Audit Readiness
Computing’s Top 30: Rohan Basu Roy
Computing’s Top 30: Rohan Basu Roy
Episode 3 | How IEEE Can Support and Enhance Academia
Episode 3 | How IEEE Can Support and Enhance Academia
Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show
Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show
Read Next

Women in STEM Workshop and CodeFest in Bhutan: Empowering the Next Generation of Female Technologists

Automating Compliance in Life Sciences for Real-Time Audit Readiness

Computing’s Top 30: Rohan Basu Roy

Episode 3 | How IEEE Can Support and Enhance Academia

Behind the Scenes: How SC Volunteers Power One of the World’s Fastest Growing Conferences and Trade Show

Computing’s Top 30: Bo Han

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

The AI Adoption Gap: Why Enterprise AI Fails After Deployment

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter