• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

CLOSED: Special Issue on Recent Advances in Securing Networked Systems

IEEE Security & Privacy seeks submissions for this upcoming issue.

Important Deadlines:

Submission deadline: 20 May 2025

Publication: Nov/Dec 2025


Networks are often the initial target of adversaries to launch attacks. Defending networks is challenging, but even more difficult for resource-constrained networks, where the resources available for defending the network are limited by the compute and energy resources of network components. Alternatively, new attack vectors may be opened by modern network architectures, such as software-defined networks, that require new solutions. 

A variety of technologies have been proposed to create, manage, and defend networks. In this special issue, we are interested in soliciting submissions that investigate the current challenges and future opportunities for defending resource-constrained networks and modern network architectures. We are particularly interested in new types of attack vectors that threaten networks and challenges in defending against such threats and methods for leveraging newer technologies, such as learning and deception. For example, in trusion detection is a challenging problem, so what can we really expect for the effectiveness of machine learning-based detection and how might such techniques be combined with traditional defenses to improve detection robustness? 

We are also interested in case studies that investigate alternative perspectives in defending either resource constrained networks or modern network architectures. For example, are there opportunities for applying deception that the community is overlooking? While game theoretical methods help us reason about how defenses and deception may thwart adversarial goals, how do we connect game theory models with practical applications of deception? 

In this special issue, we want to examine promising directions for securing resource-constrained networks and emerging network architectures. Emphasis will be p[aced on the more visionary submissions. Topics include, but are not limited to: 

  • Challenges facing conventional defenses in resource-constrained networks or modern network architectures 
  • Overlooked opportunities for preventing network attacks using advanced technologies, such as ML, deception, game theory, etc. 
  • Comparisons of effectiveness among network defenses under resource constraints 
  • Experience case studies in applying defenses to recent network security problems
  • Impact of endpoint security on preventing network attacks 
  • Experimental environments for evaluating defenses for resource-constrained networks or modern network architectures


Submission Instructions:

For author information and guidelines on submission criteria, please visit the Author Information page. Please submit full papers through the IEEE Author Portal system,  and be sure to select the special-issue or special-section name. Manuscripts should not be published or currently submitted for publication elsewhere.  Please submit only full papers intended for review, not abstracts, to the the IEEE Author Portal.


Questions?

Contact the guest editors at sp6-25@computer.org. 

  • Trent Jaeger, UC Riverside 
  • Chengyu Song, UC Riverside

LATEST NEWS
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)
Autonomous Observability: AI Agents That Debug AI
Autonomous Observability: AI Agents That Debug AI
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference
Read Next

From Isolation to Innovation: Establishing a Computer Training Center to Empower Hinterland Communities

IEEE Uganda Section: Tackling Climate Change and Food Security Through AI and IoT

Blockchain Service Capability Evaluation (IEEE Std 3230.03-2025)

Autonomous Observability: AI Agents That Debug AI

Disaggregating LLM Infrastructure: Solving the Hidden Bottleneck in AI Inference

Copilot Ergonomics: UI Patterns that Reduce Cognitive Load

The Myth of AI Neutrality in Search Algorithms

Gen AI and LLMs: Rebuilding Trust in a Synthetic Information Age

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter