• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Special Issue on Recent Advances in Securing Networked Systems

IEEE Security & Privacy seeks submissions for this upcoming issue.

Important Deadlines: Submission deadline: 20 May 2025 Publication: Nov/Dec 2025
Networks are often the initial target of adversaries to launch attacks. Defending networks is challenging, but even more difficult for resource-constrained networks, where the resources available for defending the network are limited by the compute and energy resources of network components. Alternatively, new attack vectors may be opened by modern network architectures, such as software-defined networks, that require new solutions.  A variety of technologies have been proposed to create, manage, and defend networks. In this special issue, we are interested in soliciting submissions that investigate the current challenges and future opportunities for defending resource-constrained networks and modern network architectures. We are particularly interested in new types of attack vectors that threaten networks and challenges in defending against such threats and methods for leveraging newer technologies, such as learning and deception. For example, in trusion detection is a challenging problem, so what can we really expect for the effectiveness of machine learning-based detection and how might such techniques be combined with traditional defenses to improve detection robustness?  We are also interested in case studies that investigate alternative perspectives in defending either resource constrained networks or modern network architectures. For example, are there opportunities for applying deception that the community is overlooking? While game theoretical methods help us reason about how defenses and deception may thwart adversarial goals, how do we connect game theory models with practical applications of deception?  In this special issue, we want to examine promising directions for securing resource-constrained networks and emerging network architectures. Emphasis will be p[aced on the more visionary submissions. Topics include, but are not limited to: 
  • Challenges facing conventional defenses in resource-constrained networks or modern network architectures 
  • Overlooked opportunities for preventing network attacks using advanced technologies, such as ML, deception, game theory, etc. 
  • Comparisons of effectiveness among network defenses under resource constraints 
  • Experience case studies in applying defenses to recent network security problems
  • Impact of endpoint security on preventing network attacks 
  • Experimental environments for evaluating defenses for resource-constrained networks or modern network architectures

Submission Instructions:

For author information and guidelines on submission criteria, please visit the Author Information page. Please submit full papers through the IEEE Author Portal system,  and be sure to select the special-issue or special-section name. Manuscripts should not be published or currently submitted for publication elsewhere.  Please submit only full papers intended for review, not abstracts, to the the IEEE Author Portal.

Questions?

Contact the guest editors at sp6-25@computer.org. 
  • Trent Jaeger, UC Riverside 
  • Chengyu Song, UC Riverside
LATEST NEWS
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success
Computing’s Top 30: Sukanya S. Meher
Computing’s Top 30: Sukanya S. Meher
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces
Computing’s Top 30: Tejas Padliya
Computing’s Top 30: Tejas Padliya
Read Next

Reimagining AI Hardware: Neuromorphic Computing for Sustainable, Real-Time Intelligence

Quantum Insider Session Series: Strategic Networking in the Quantum Ecosystem for Collective Success

Computing’s Top 30: Sukanya S. Meher

Securing the Software Supply Chain: Challenges, Tools, and Regulatory Forces

Computing’s Top 30: Tejas Padliya

Reimagining Infrastructure and Systems for Scientific Discovery and AI Collaboration

IEEE 2881: Learning Metadata Terms (LMT) Empowers Learning in the AI Age

Platform Engineering: Bridging the Developer Experience Gap in Enterprise Software Development

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter