All submissions in the magazine’s scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.
Articles that report the latest advances in research, particularly those that address a narrow technical area and those that lack content reporting results of experimental validation or deployment of new methods or technologies, are generally not suitable for publication in IEEE Security & Privacy. Authors of such works are advised to submit them to research conferences and journals with the appropriate scope. IEEE Transactions on Reliability or IEEE Transactions on Secure and Dependable Systems, for example, might provide appropriate venues for some such submissions.
S&P is copublished by the IEEE Computer Society and the IEEE Reliability Society.
Technical cosponsors: IEEE Signal Processing Society and IEEE Engineering in Medicine & Biology Society
S&P accepts commercial and classified advertisements.
IEEE Security & Privacy’s primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community—ranging from academic researchers to industry practitioners. It provides articles with both a practical and research bent by the top thinkers in the field of security and privacy, along with case studies, surveys, tutorials, columns, and in-depth interviews and podcasts for the information security industry.
Through special issues, the magazine explores other timely aspects of privacy in areas such as usable security, the Internet of Things, cloud computing, cryptography, and big data. Other popular topics include software, hardware, network, and systems security, privacy-enhancing technologies, data analytics for security and privacy, wireless/mobile and embedded security, security foundations, security economics, privacy policies, integrated design methods, sociotechnical aspects, and critical infrastructure. In addition, the magazine accepts peer-reviewed articles of wide interest under a general call, and also features regular columns on hot topics and interviews with luminaries in the field.
Topics include, but are not limited to:
· Network Security
· Software and Hardware Security
· Systems Security
· Embedded Security
· Privacy-Enhancing Technologies
· Data Analytics for Security and Privacy
· Usable Security and Privacy
· Physical and Human Security
· Wireless and Mobile Security
· Security Foundations
· Security Economics
· Security and Privacy Policies
· Integrated Security Design Methods
· Critical Infrastructures
· Sociotechnical Security and Privacy
· Social Networks and Computing
· Cybercrime and Forensics
· Developer and User Training
· Real-World Cryptography
· Intrusion Detection