Emerging topics in Cyber Security
IEEE Transactions on Emerging Topics in Computing
Special Issue/Section - First Issue of 2015

Cyber Security is a topic which is getting a very high level of
attention from researchers, decision makers, policy makers and from the
general public.

For this reason, the IEEE Transactions on Emerging Topics in Computing
(TETC) seek original manuscripts for a Special Issue on Emerging Topics
in Cyber Security, scheduled to appear in the first issue of 2015. TETC
is the newest Transactions of the IEEE Computer Society, and it uses an
Open Access model exclusively.

Papers may present advances in the theory, design, implementation,
analysis, verification, or empirical evaluation and measurement of cyber
security systems, to deal with emerging computing technologies and
applications. Given the the peculiar nature of TETC, we are seeking in
particular papers that are more "far-reaching" than is usual for journal
submissions, as long as they show promise for opening up new areas of
study, or questioning long-held beliefs and tenets of the cybersecurity

For a more extensive list of possible topics of interest, please refer
to the complete version of this CfP, available at:

All aspects of computer security and privacy with a novel, emerging
theme can be addressed. Papers without a clear application to security
or privacy, however, will be considered out of scope and may be rejected
without full review.

Submitted articles must not have been previously published, nor be
currently submitted for journal publication elsewhere. Revised and
extended versions of high-quality papers from top conferences in the
area can be submitted, along with a detailed list of changes and additions.

Please submit your paper to Manuscript Central at

The submission deadline is Sept. 1st, 2014.

Please address all correspondence regarding this special issue to either
of the guest editors:

Giorgio Di Natale, LIRMM, (articles with a
focus on hardware security and cryptography)

Stefano Zanero, Politecnico di Milano,
(articles with a focus on software, network and systems security)