• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEENetwork Security
  • Software and Hardware Security
  • Systems Security
  • Embedded Security
  • Privacy-Enhancing Technologies
  • Data Analytics for Security and Privacy
  • Usable Security and Privacy
  • Physical and Human Security
  • Wireless and Mobile Security
  • Security Foundations
  • Security Economics
  • Security and Privacy Policies
  • Integrated Security Design Methods
  • Critical Infrastructures
  • Sociotechnical Security and Privacy
  • Social Networks and Computing
  • Surveillance
  • Cybercrime and Forensics
  • Developer and User Training
  • Real-World Cryptography
  • Intrusion Detection
  • Malware

  • Submission Instructions:

    Please ensure your submission aligns with the magazine’s topics and scope. Submitted articles should be understandable to a broad audience of people interested in security and privacy. The writing should be down to earth, practical, and original. Authors should not assume that the audience will have specialized experience in a particular subfield. All accepted articles will be professionally edited and formatted. Articles should provide insights about a subject by considering and evaluating different approaches based on certain criteria: for instance, an article can implement various schemes used for smart contracts and compare and evaluate them. S&P is interested in the general added value rather than a very specific and scientific article. An example would be a review of existing literature that provides recommendations for tackling the problems of the existing work, not worked-out proposals of solving that problem. Surveys and tutorials are in scope, particularly where there are new technologies or approaches that haven’t yet had broad exposure. As this is not a research journal, please do not submit research papers, particularly those that address a narrow technical area and those that lack results of experimental validation or deployment of new methods or technologies. Authors of such works are advised to submit to conferences and journals with the appropriate scope.
    IEEE Transactions on Reliability or IEEE Transactions on Dependable and Secure Computing, for example, might provide appropriate venues for such submissions. If there is any question of whether a paper fits these criteria or would otherwise be of interest to S&P, we recommend contacting the editor in chief (EIC). For author information and guidelines on submission criteria, please visit IEEE Security & Privacy Author Information page.

    Questions?

    Contact Editorial board, advisory board, and staff
    LATEST NEWS