• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

FacebookTwitterLinkedInInstagramYoutube
  • Home
  • /Digital Library
  • /Magazines
  • /Sp
  • Home
  • / ...
  • /Magazines
  • /Sp

Call for Papers: IEEE Security & Privacy

IEEE Security & Privacy seeks submissions for upcoming issues.

About IEEE Security & Privacy IEEE Security & Privacy (S&P)’s mission is to be the best source of reliable, useful, peer-reviewed information for those aiming to understand how systems, data, and people are protected in a world of rapid technology evolution. This bimonthly magazine publishes articles that have clarity and context, targeting a wide audience who understand technology, from developers to executives, managers to policy-makers, and researchers interested in problems with practical impact. Peer-reviewed articles and columns by real-world experts illuminate all aspects of the field, including systems, attacks and defenses, software security, applied cryptography, usability, forensics, big data, ethics, biometrics, and more, with special issues focusing on targeted topics as well as issues devoted to key events and conferences.

Scope of Interest

S&P aims to provide a unique combination of research articles, case studies, tutorials, and departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership. Topics include, but are not limited to:
  • Network Security
  • Software and Hardware Security
  • Systems Security
  • Embedded Security
  • Privacy-Enhancing Technologies
  • Data Analytics for Security and Privacy
  • Usable Security and Privacy
  • Physical and Human Security
  • Wireless and Mobile Security
  • Security Foundations
  • Security Economics
  • Security and Privacy Policies
  • Integrated Security Design Methods
  • Critical Infrastructures
  • Sociotechnical Security and Privacy
  • Social Networks and Computing
  • Surveillance
  • Cybercrime and Forensics
  • Developer and User Training
  • Real-World Cryptography
  • Intrusion Detection
  • Malware

Submission Instructions:

Please ensure your submission aligns with the magazine’s topics and scope. Submitted articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be professionally edited and formatted. Articles should provide insights about a subject by considering and evaluating different approaches based on certain criteria: for instance, an article can implement various schemes used for smart contracts and compare and evaluate them. S&P is interested in the general added value rather than a very specific and scientific article. An example would be a review of existing literature that provides recommendations for tackling the problems of the existing work, not worked-out proposals of solving that problem. Surveys and tutorials are in scope, particularly where there are new technologies or approaches that haven’t yet had broad exposure. As this is not a research journal, please do not submit research papers, particularly those that address a narrow technical area and those that lack results of experimental validation or deployment of new methods or technologies. Authors of such works are advised to submit to conferences and journals with the appropriate scope. IEEE Transactions on Reliability or IEEE Transactions on Dependable and Secure Computing, for example, might provide appropriate venues for such submissions. If there is any question of whether a paper fits these criteria or would otherwise be of interest to S&P, we recommend contacting the editor in chief (EIC). For author information and guidelines on submission criteria, please visit IEEE Security & Privacy Author Information page.

Questions?

Contact Editorial board, advisory board, and staff
LATEST NEWS
How to Evaluate LLMs and GenAI Workflows Holistically
How to Evaluate LLMs and GenAI Workflows Holistically
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
Exploring the Elegance and Applications of Complexity and Learning in Computer Science
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol
Read Next

How to Evaluate LLMs and GenAI Workflows Holistically

The Kill Switch of Vengeance: The Double-Edged Sword of Software Engineering Talent

Exploring the Elegance and Applications of Complexity and Learning in Computer Science

IEEE CS and ACM Honor Saman Amarasinghe with 2025 Ken Kennedy Award

IEEE Std 3221.01-2025: IEEE Standard for Blockchain Interoperability—Cross Chain Transaction Consistency Protocol

Celebrate IEEE Day 2025 with the IEEE Computer Society

Building Community Through Technology: Sardar Patel Institute of Technology (SPIT) Student Chapter Report

IEEE CS and ACM Announce Recipients of 2025 George Michael Memorial HPC Fellowship

Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter