{"id":911,"date":"2024-02-16T20:05:29","date_gmt":"2024-02-16T20:05:29","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/16\/cyber-security-and-resilience-csr-2024\/"},"modified":"2024-02-16T20:05:29","modified_gmt":"2024-02-16T20:05:29","slug":"cyber-security-and-resilience-csr-2024","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2024\/02\/16\/cyber-security-and-resilience-csr-2024\/","title":{"rendered":"Cyber Security and Resilience (CSR-2024)"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div style=\"font-family: Open Sans, sans-serif; position: relative; overflow: hidden;\">\n<h3>Important Dates<\/h3>\n<ul>\n<li>Submission Deadline: 30 April 2024<\/li>\n<li>Publication: (tentative) Fall 2024<\/li>\n<\/ul>\n<hr\/>\n<p><span style=\"font-weight: 400;\">Authors are invited to submit a manuscript to the IEEE TETC Special Section on Cyber Security and Resilience <\/span><b>(CSR-2024)<\/b><span style=\"font-weight: 400;\">. Relevant topics of interest to this special section include (but are not limited to):<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explainable AI for cyber security and resilience\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuum Computing Security\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Self-adaptation in cyber security and resilience<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Multi-party computation for privacy and security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security and trust in Autonomous System\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AI for detection\u00a0\u00a0\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scalable Distributed Ledger Technology for security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure Federated Learning\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Computational complexity and cryptography<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gamification in cyber-security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Efficient Security Intelligence solutions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scalable Security and privacy frameworks<\/span><\/li>\n<\/ol>\n<hr\/>\n<h3>Submission Guidelines<\/h3>\n<p><span style=\"font-weight: 400;\">Submitted papers must include new significant research-based technical contributions in the scope of the journal. Purely theoretical, technological or lacking methodological-and-generality papers are not suitable to this special issue. The submissions must include clear evaluations of the proposed solutions (based on simulation and\/or implementations results) and comparisons to state-of-the-art solutions. For additional information please contact the Guest Editors by sending an email exclusively to <\/span><span style=\"font-weight: 400;\">ieee.tetc.csr@gmail.com<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Papers under review elsewhere are not acceptable for submission. Extended versions of published conference papers <\/span><span style=\"font-weight: 400;\">(to be included as part of the submission together with a summary of differences) <\/span><span style=\"font-weight: 400;\">are welcome <\/span><b>but<\/b><span style=\"font-weight: 400;\"> there must have at least <\/span><b>40% of new impacting technical\/scientific material <\/b><span style=\"font-weight: 400;\">in the submitted journal version and there should be <\/span><b>less than 50% verbatim similarity level<\/b><span style=\"font-weight: 400;\"> as reported by a tool (such as CrossRef).<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Guidelines concerning the submission process, LaTeX and Word templates can be found<strong> here<\/strong><\/span><strong>. <\/strong><span style=\"font-weight: 400;\">While submitting<\/span>\u00a0<span style=\"font-weight: 400;\">through <strong>ScholarOne<\/strong>, please select the option \u201c<\/span><i><span style=\"font-weight: 400;\">Special Section on <\/span><\/i><i><span style=\"font-weight: 400;\">Cyber Security and Resilience(CSR-2014)<\/span><\/i><span style=\"font-weight: 400;\">\u201c.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As per TETC policies, only full-length papers (10-16 pages with technical material, double column \u2013 papers beyond 12 pages will be subject to MOPC, as per CS policies -) can be submitted to special sections. <\/span><span style=\"font-weight: 400;\">The bibliography should not exceed 45 items and each Author\u2019s bio should not exceed 150 words. Authors are also invited to comply with the journal\u2019s policies about the maximum number of self-references.<\/span><\/p>\n<hr\/>\n<h3>Questions?<\/h3>\n<p><strong>Contact the guest editors at eee.tetc.csr@gmail.com.<\/strong><\/p>\n<ul>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Francesco Flammini, IDSIA USI-SUPSI, Switzerland and M\u00e4lardalen University, Sweden (IEEE Senior Member)<\/span><\/li>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Emanuele Bellini, University of Roma Tre, Italy (IEEE Member)\u00a0<\/span><\/li>\n<li data-pm-slice=\"1 1 []\"><span style=\"font-weight: 400;\">Quidan Li, Chinese Academy of Sciences, China,\u00a0 (IEEE Member) <\/span><span style=\"font-weight: 400;\">Corresponding TETC Editor: Francesco Flammini<\/span><\/li>\n<\/ul><\/div>\n<p>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/digital-library\/journals\/ec\/cfp-cyber-security-and-resilience\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Important Dates Submission Deadline: 30 April 2024 Publication: (tentative) Fall 2024 Authors are invited to submit a manuscript to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":912,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[486,703,736],"tags":[],"class_list":["post-911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-call-for-papers","category-call-for-papers-filter-post","category-cfp-tetc"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/911\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/912"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}