Journal Information
IEEE Transactions on Dependable and Secure Computing (TDSC)
https://www.computer.org/csdl/journal/tq
Impact Factor:
7.000
Publisher:
IEEE
ISSN:
1545-5971
Viewed:
55954
Tracked:
121
Call For Papers
IEEE Transactions on Dependable and Secure Computing (TDSC) publishes archival research results focusing on research into foundations, methodologies, and mechanisms that support the achievement–through design, modeling, and evaluation–of systems and networks that are dependable and secure to the desired degree without compromising performance. The focus also includes measurement, modeling, and simulation techniques, and foundations for jointly evaluating, verifying, and designing for performance, security, and dependability constraints.

Topics include, but are not limited to, the following:

I. Design for Dependability and Security

    Architectures
        Fault-tolerant, secure, and safe middleware
        Intrusion detection and tolerance
        Firewall technologies; authentication and authorization of users, systems, and applications
        Network technologies, including protocols, routers, and switches
        On-line detection and recovery
    System Management and Administration
    Cryptography
        Application of cryptography techniques
        Key management
        Cryptographic protocols and algorithms, and their security
    Use of COTS components

II. Evaluation

    Modeling and Prediction
        Threat-assessment and intrusion-detection models
        Availability, performability, and survivability
        Intrusion tolerance; attack models
        Modeling methods, including Markov chains, queuing/fluid flow, Stochastic Petri Nets (SPN), SAN models
    Experimental Methods
        Monitoring and measurement
        Workload characterization
        Benchmarking
        Test-bed design, including fault, error, attack, and workload generation
        Field monitoring and measurement, including failures, security violations and break-ins, and intrusion detection
        Statistical methods
    Formal Specification and Verification
    Quality of Service (encompassing performability, security, and safety)

III. Application-Specific Areas

    Survivable Database Design and Transaction Processing
    Electronic Commerce
    Embedded Systems
    File and File System Security
    Distributed and Pervasive Systems
    Smartcards and Biometrics
    Real-Time Systems
    Safety-Critical Systems (e.g., aerospace computing)
    Internet Applications
    Multimedia Applications and Signal-Processing

IV. Software Design

    Operating System Support (for error/intrusion detection and/or tolerance)
    Self-Checking Software Systems
    Dependable, Secure Protocols and Network Interfaces
    Software Testing, Validation, and Verification
    Software Aging and Rejuvenation
    Software Security and Reliability Engineering

V. New Technologies (problems and opportunities)

    Nanoscale Computing
    Ad Hoc Networks
    Pervasive and Embedded Computing
    Networks of Satellites
    Data Mining
    Wearable Computers and Associated Networks
    Quantum Computing
    Cyber-Physical Systems (e.g., mobile health, Smart Grid, and ITS)

Additional Information

As noted in the Jan-Mar. 2009 editorial, please note the following additional clarification of our scope: “Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication’s scope.”

TDSC welcomes proposals for topic-oriented special issues. Guidelines are provided here.

In addition to policies specified at Instructions for Peer Review, TDSC specifically has the following policies: (1) Papers which require a major revision will not receive a second major revision recommendation. In such situations the paper will be rejected. Authors should not assume that a major revision will lead to eventual acceptance. (2) The scope of topics was clarified in the editorial of the Jan-Mar 2009 issue as follows. “Our Editorial Board decided that papers of purely theoretical interest in the area of cryptography without a clear and manifest application to a specific problem of dependability or security would fall out of the purview of these Transactions; similarly, papers addressing generic systems-management problems, as opposed to specific dependability and security challenges, as well those solving device-level, as opposed to system-level, dependability and security concerns, would also be out of our publication’s scope.” (3) TDSC requires meaningful technical novelty in submissions that extend previously published conference papers. Extension beyond the conference version(s) is not simply a matter of length. Thus, expanded motivation, expanded discussion of related work, variants of previously reported algorithms, incremental additional experiments/simulations, proofs of results/theorems, may provide additional length but will fall below the line for proceeding with review.
Last updated by Dou Sun in 2024-07-25
Related Journals
CCFFull NameImpact FactorPublisherISSN
APL Photonics5.400American Institute of Physics2378-0967
aIEEE Transactions on Dependable and Secure Computing7.000IEEE1545-5971
Entropy2.100MDPI1099-4300
Journal of Electrical And Electronics Engineering2.300IJRDO2456-6055
Journal of Computer and Systems Sciences International0.500Springer1064-2307
IEEE Transactions on Power Delivery3.800IEEE0885-8977
Journal of Classification1.800Springer0176-4268
Ethics and Information Technology3.400Springer1388-1957
bACM Transactions on Embedded Computing Systems2.800ACM1539-9087
Journal of Machine EngineeringWroclaw Board of Scientific Technical1895-7595
Related Conferences
CCFCOREQUALISShortFull NameSubmissionNotificationConference
b4MMEDIAInternational Conferences on Advances in Multimedia2022-01-242022-02-172022-04-24
CooIDCUSENIX Workshop on Cool Topics in Sustainable Data Centers2015-12-222016-02-022016-03-19
CAPCOMContext Awareness, Pervasive COmputing, and Mobility2013-08-072013-09-072013-11-25
MIX-AIMIX Summit and Conference on Artificial Intelligence and Machine Learning2018-03-162018-04-202018-07-24
HCI-EuropeInternational Conferences in Central Europe on Human Computer Interfaces2015-06-202015-07-102015-09-14
SPDAInternational Conference on Smart Phone, Device and Applications2014-06-102014-06-302014-08-14
WOOTUSENIX Workshop on Offensive Technologies2020-05-272020-06-232020-08-10
cb3SAMTInternational Conference on Semantic and Digital Media Technologies 2010-08-302010-12-01
FSMEInternational Conference on Future Software Engineering and Multimedia Engineering2011-07-102011-07-152011-08-13
FDLForum on specification & Design Languages2015-05-182015-07-042015-09-14
Recommendation