Journal Information
IEEE Transactions on Dependable and Secure Computing (TDSC)
https://www.computer.org/csdl/journal/tqImpact Factor: |
7.000 |
Publisher: |
IEEE |
ISSN: |
1545-5971 |
Viewed: |
61524 |
Tracked: |
122 |
Call For Papers
IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints. Topics include, but are not limited to, the following: I. Design for Dependability and Security Architectures Fault-tolerant, secure, and safe middleware Intrusion detection and tolerance Firewall technologies; authentication and authorization of users, systems, and applications Network technologies, including protocols, routers, and switches On-line detection and recovery System Management and Administration Cryptography Application of cryptography techniques Key management Cryptographic protocols and algorithms, and their security Use of COTS components II. Evaluation Modeling and Prediction Threat-assessment and intrusion-detection models Availability, performability, and survivability Intrusion tolerance; attack models Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models Experimental Methods Monitoring and measurement Workload characterization Benchmarking Test-bed design, including fault, error, attack, and workload generation Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection Statistical methods Formal Specification and Verification Quality of Service (encompassing performability, security, and safety) III. Application-Specific Areas Survivable Database Design and Transaction Processing Electronic Commerce Embedded Systems File and File System Security Distributed and Pervasive Systems Smartcards and Biometrics Real-Time Systems Safety-Critical Systems (e.g., aerospace computing) Internet Applications Multimedia Applications and Signal-Processing IV. Software Design Operating System Support (for error/intrusion detection and/or tolerance) Self-Checking Software Systems Dependable, Secure Protocols and Network Interfaces Software Testing, Validation, and Verification Software Aging and Rejuvenation Software Security and Reliability Engineering V. New Technologies (problems and opportunities) Nanoscale Computing Ad Hoc Networks Pervasive and Embedded Computing Networks of Satellites Data Mining Wearable Computers and Associated Networks Quantum Computing Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS) Additional Information As noted in the Jan-Mar. 2009 editorial, please note the following additional clarification of our scope: “Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication’s scope.” TDSC welcomes proposals for topic-oriented special issues. Guidelines are provided here. In addition to policies specified at Instructions for Peer Review, TDSC specifically has the following policies: (1) Papers which require a major revision will not receive a second major revision recommendation. In such situations the paper will be rejected. Authors should not assume that a major revision will lead to eventual acceptance. (2) The scope of topics was clarified in the editorial of the Jan-Mar 2009 issue as follows. “Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication’s scope.” (3) TDSC requires meaningful technical novelty in submissions that extend previously published conference papers. Extension beyond the conference version(s) is not simply a matter of length. Thus, expanded motivation, expanded discussion of related work, variants of previously reported algorithms, incremental additional experiments/simulations, proofs of results/theorems, may provide additional length but will fall below the line for proceeding with review.
Last updated by Dou Sun in 2024-07-25
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
APL Photonics | 5.400 | American Institute of Physics | 2378-0967 | |
a | IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE | 1545-5971 |
Entropy | 2.100 | MDPI | 1099-4300 | |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO | 2456-6055 | |
Journal of Computer and Systems Sciences International | 0.500 | Springer | 1064-2307 | |
IEEE Transactions on Power Delivery | 3.800 | IEEE | 0885-8977 | |
Journal of Classification | 1.800 | Springer | 0176-4268 | |
Ethics and Information Technology | 3.400 | Springer | 1388-1957 | |
b | ACM Transactions on Embedded Computing Systems | 2.800 | ACM | 1539-9087 |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical | 1895-7595 |
Full Name | Impact Factor | Publisher |
---|---|---|
APL Photonics | 5.400 | American Institute of Physics |
IEEE Transactions on Dependable and Secure Computing | 7.000 | IEEE |
Entropy | 2.100 | MDPI |
Journal of Electrical And Electronics Engineering | 2.300 | IJRDO |
Journal of Computer and Systems Sciences International | 0.500 | Springer |
IEEE Transactions on Power Delivery | 3.800 | IEEE |
Journal of Classification | 1.800 | Springer |
Ethics and Information Technology | 3.400 | Springer |
ACM Transactions on Embedded Computing Systems | 2.800 | ACM |
Journal of Machine Engineering | Wroclaw Board of Scientific Technical |
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
MMEDIA | International Conferences on Advances in Multimedia | 2022-01-24 | 2022-04-24 |
CooIDC | USENIX Workshop on Cool Topics in Sustainable Data Centers | 2015-12-22 | 2016-03-19 |
CAPCOM | Context Awareness, Pervasive COmputing, and Mobility | 2013-08-07 | 2013-11-25 |
MIX-AI | MIX Summit and Conference on Artificial Intelligence and Machine Learning | 2018-03-16 | 2018-07-24 |
HCI-Europe | International Conferences in Central Europe on Human Computer Interfaces | 2015-06-20 | 2015-09-14 |
SPDA | International Conference on Smart Phone, Device and Applications | 2014-06-10 | 2014-08-14 |
WOOT | USENIX Workshop on Offensive Technologies | 2020-05-27 | 2020-08-10 |
SAMT | International Conference on Semantic and Digital Media Technologies | 2010-12-01 | |
FSME | International Conference on Future Software Engineering and Multimedia Engineering | 2011-07-10 | 2011-08-13 |
FDL | Forum on specification & Design Languages | 2015-05-18 | 2015-09-14 |
Recommendation