IEEE.org
IEEE CS Standards
Career Center
About Us
Subscribe to Newsletter
0
Sign In
Network Security
Software and Hardware Security
Systems Security
Embedded Security
Privacy-Enhancing Technologies
Data Analytics for Security and Privacy
Usable Security and Privacy
Physical and Human Security
Wireless and Mobile Security
Security Foundations
Security Economics
Security and Privacy Policies
Integrated Security Design Methods
Critical Infrastructures
Sociotechnical Security and Privacy
Social Networks and Computing
Surveillance
Cybercrime and Forensics
Developer and User Training
Real-World Cryptography
Intrusion Detection
Malware
Submission Instructions:
Please ensure your submission aligns with the magazine’s topics and scope. Submitted articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be professionally edited and formatted. Articles should provide insights about a subject by considering and evaluating different approaches based on certain criteria: for instance, an article can implement various schemes used for smart contracts and compare and evaluate them.
S&P
is interested in the general added value rather than a very specific and scientific article. An example would be a review of existing literature that provides recommendations for tackling the problems of the existing work, not worked-out proposals of solving that problem. Surveys and tutorials are in scope, particularly where there are new technologies or approaches that haven’t yet had broad exposure. As this is not a research journal, please
do not submit
research papers, particularly those that address a narrow technical area and those that lack results of experimental validation or deployment of new methods or technologies. Authors of such works are advised to submit to conferences and journals with the appropriate scope.
IEEE Transactions on Reliability
or
IEEE Transactions on Dependable and Secure Computing
, for example, might provide appropriate venues for such submissions. If there is any question of whether a paper fits these criteria or would otherwise be of interest to
S&P
, we recommend contacting the editor in
chief (EIC)
.
For author information and guidelines on submission criteria, please visit
IEEE Security & Privacy
Author Information page.
Questions?
Contact
Editorial board
, advisory board, and
staff
LATEST NEWS