
| Editor in Chief | Dr. Tarak Nandy Institute of Computer Science and Digital Innovation, |
| ISSN (Online) | 2584-0665 |
| Subject | Cyber Security |
| Year of Starting | 2023 |
| Publication Frequency | 4 Issue Per Year |
| Language | English |
| Paper Submission ID | security@dsjournals.com |
| Format of Publication | Online |
| Publication Fee | Free of Cost Journal |
| Publisher | Dream Science |
Aim and Scope
Dream Science Journal of Cyber Security (DS-CYS) is an online, open-access, peer-reviewed journal which provides a forum for the dissemination of research related to all aspects of sciences, technologies, and applications relating to hardware security, software security and system security. Cyber Security is the basis of information dissemination in the internet age and a rapidly growing area of computer science and technology, encompassing software, systems, IT, networks, communications, cryptography, and various other fields across numerous platforms, including traditional computers, smartphones, tablets, servers and any networkable device, whether Internet-connected or not. DS-CYS is a new journal aimed at publishing World-leading research and is dedicated to being the primary platform for research in all technical areas of cyber security. This journal is aimed to systematically cover all essential aspects of Cyber Security, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies. It will encompass original research and review papers in computer science, electronics, networking, information technology, systems, telecommunications, and other related areas of security protocols, approaches and techniques applied to all types of information and communication networks, including wired, wireless and optical transmission platforms. In addition, the journal also includes interdisciplinary articles that cover the privacy, ethical, legal, and economic aspects of Cyber Security.
The journal also aims at becoming an international source of innovation and an essential reading for IT security professionals around the world by providing an in-depth and holistic view of all security spectrums and solutions ranging from practical to theoretical. The journal’s goal is to attract a broad spectrum of article types in order to foster collaboration between different fields working to address the emergence of security and privacy threats and to bring together researchers and practitioners dealing with the diverse fields of Cyber Security and cover topics that are equally valuable for professionals as well as for those new in the field from all sectors industry, commerce and academia. The articles can include traditional research-focused articles; educational surveys to instruct the broader technical community; informative articles that discuss practical policy, legal, and economic aspects of Cyber Security; and editorial or position articles that pose new ideas and paradigm shifts for the field of Cyber Security. Answering the highly practical and commercial importance of network security R&D, submissions of applications-oriented papers describing case studies and simulations are encouraged, as well as research analysis-type papers. DS-CYS also accepts the substantially extended version of the conference papers in the field of cyber security.
DS Journal of Cyber Security solicits articles adhering to the following broadly constructed and interpreted aspects of Cyber Security:
Advanced Persistent Threat (APT)
Adversarial Machine Learning
Adversarial Reasoning
AI Security
Analysis of Vulnerabilities and Attacks
Anomaly and Intrusion Detection and Countermeasures to Prevent Detection
Anonymization and De-Identification Technologies
Applied Cryptography and Cryptographic Protocols
Authenticated Key Agreement Protocols
Authentication and Identity Management Technologies
Big Data Security and Privacy
Cloud Computing and Security and Privacy Threats in the Cloud
Computer Science and Security
Critical Infrastructure Protection
Cryptography and Associated Topics
Cryptology
Cyber Attacks
Cyber Breaches
Cyber Defence Tools for Improving the Level of Cyber Security
Cyber Security Education
Cyber Security in Internet of Things (IoT)
Cyber Warfare
Cyber-Physical Security
Cyber Security Data Analytics
Darknet and Darkweb
Data Loss Prevention (DLP)
Data-Driven Security and Measurement Studies
Denial of service (DoS) Against Communication and Computing Services and Countermeasures Against DoS
Design and Test Strategies for Secure and Survivable Systems
Digital Forensics & Counter Forensics
Digital Ledger Technology
Economics of Security
Emerging Trends in Cyber Security
Encryption and Encryption-By-Default
Firewalls
Forensics Including Computer and Network Forensics
Hacking
Hardware Security
Information Hiding, Including Steganology
Information-Theoretic Security
Insider Threats
Jamming and Interference
Key Generation and Key Distribution Schemes
Key Management Cryptographic Credential Management
Legal and Public Policy Aspects of Security and Privacy
Machine Learning Mechanisms for Cyber Security
Machine Learning Security
Malware and Malware Analysis
Malware Reverse Engineering and Malware Defense and Mitigation Strategies
Modern Tools for Improving Cyber Security
Network and Critical Infrastructure Security
Physical Layer Security and Cross-Layer Security for Communications
Privacy and Privacy Enhancing Technologies Including Applications to New Domains
Privacy Attacks and Protection
Privacy-Enhancing Technologies and Anonymity
Quantum Computing Based Encryption and Decryption Techniques
Quantum Security
Quantum-Safe Digital Signature Schemes
Quantum-Safe Encryption Algorithms
Quantum-Safe Key Management Mechanisms
Secure Operating Systems and Applications
Security and Crime Science
Security and Mobility Optimization
Security in Mobile Networks
Security Issues in Intelligent Transportation Systems (ITS)
Security Issues in Various Networking Technologies
Security Metrics and The Science Of Security
Smart Grid and Power/Energy Systems Security
Social Networks Security
Software, Hardware and System Security
Cyber Threat Detection/Protection
Traffic Measurements for Cyber Security
Usable Security
Viruses
Vulnerability Analysis
Wireless Physical Layer Security