• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

Call For Papers: Special Issue on Real-World Security: Impact Beyond the Publications

IEEE Security & Privacy seeks submissions for this upcoming issue.

Submission deadline: 1 November 2026

Publication: May/June 2027


Now, more than ever, it is clear that security and privacy are real-world challenges affecting companies, institutions, and individuals in all aspects of daily life. The research community has contributed significantly towards addressing these challenges through finding impactful security vulnerabilities and developing innovative solutions that are now widely deployed. However, achieving this type of direct real-world impact comes with its own set of challenges, which often go beyond what would typically be presented in a research paper.

This special issue solicits articles describing research that has had a direct impact on real-world security and privacy, going beyond a scientific publication. This could range from identifying vulnerabilities in deployed systems through to developing solutions that have been used in practice. Importantly, articles for this special issue should focus on the specific challenges encountered in the process of achieving real-world impact, and how they were overcome. These could include experiences with Coordinated Vulnerability Disclosure (CVD), technical challenges in deploying a mitigation, or socio-technical challenges in navigating ethical, legal, or regulatory considerations. If applicable, articles can group together experiences from several different projects or papers and describe their overall impact.

An ideal article would demonstrate that security and privacy research can have direct real world impact beyond publications, and summarize the lessons learned from that process to help other researchers achieve similar goals. Topics of interest include, but are not limited to:

  • Experiences with Coordinated Vulnerability Disclosure to industry or open-source projects
  • Responsibly measuring or quantifying security and privacy risks in real-world systems
  • Collaborating with industry to improve the security of deployed systems
  • Defining or contributing to standards that are used in practice

Submission Instructions:

For author information and guidelines on submission criteria, please visit the Author Information page. As stated in the Author Information, peer-reviewed articles should run between 4,900 to 7,200 words, including all main body, abstract, keyword, bibliography, biography, and table text. The word count should include 250 words for each table and figure. There should be no more than 15 references. The abstract word limit is 50 words. Please submit full papers through the IEEE Author Portal system,  and be sure to select the special-issue or special-section name. Manuscripts should not be published or currently submitted for publication elsewhere. Please submit only full papers intended for review, not abstracts, to the IEEE Author Portal. All submitted manuscripts will undergo a single-anonymous peer review.

In addition to submitting your paper to IEEE Security & Privacy, you are also encouraged to upload the data related to your paper to IEEE DataPort. IEEE DataPort is IEEE's data platform that supports the storage and publishing of datasets while also providing access to thousands of research datasets. Uploading your dataset to IEEE DataPort will strengthen your paper and will support research reproducibility. Your paper and the dataset can be linked, providing a good opportunity for you to increase the number of citations you receive. Data can be uploaded to IEEE DataPort prior to submitting your paper or concurrent with the paper submission. Thank you!


Guest Editors

Contact the guest editors at sp3-27@computer.org.

  • Mohammad Mannan, Concordia University
  • Andrew Paverd, Microsoft Security Response Center
LATEST NEWS
IEEE CS High-Performance Computing Conference SC Recognized as Fastest Growing Event in 2025
IEEE CS High-Performance Computing Conference SC Recognized as Fastest Growing Event in 2025
ASTRA 2025: Neuroimaging, Brain-Computer Interfaces, and AI
ASTRA 2025: Neuroimaging, Brain-Computer Interfaces, and AI
IEEE Computer Society Launches Software Professional Certification
IEEE Computer Society Launches Software Professional Certification
IEEE LCN 2025: Promoting Sustainability and Carbon Neutrality
IEEE LCN 2025: Promoting Sustainability and Carbon Neutrality
CS Juniors: Girls.comp Day
CS Juniors: Girls.comp Day
Read Next

IEEE CS High-Performance Computing Conference SC Recognized as Fastest Growing Event in 2025

ASTRA 2025: Neuroimaging, Brain-Computer Interfaces, and AI

IEEE Computer Society Launches Software Professional Certification

IEEE LCN 2025: Promoting Sustainability and Carbon Neutrality

CS Juniors: Girls.comp Day

The Stylist in the Machine: Shipping a Day-1 Fashion Recommender with LLMs

LinkedIn Profile Template

Quantum Insider Session Series: Choosing the Right Time and Steps to Start Working with Quantum Technologies

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter