DS Journal of Cyber Security (DS-CYS)

Topics

DS-CYS also aims at becoming an international source of innovation and an essential reading for IT security professionals around the world by providing an in-depth and holistic view of all security spectrums and solutions ranging from practical to theoretical. The journal’s goal is to attract a broad spectrum of article types in order to foster collaboration between different fields working to address the emergence of security and privacy threats and to bring together researchers and practitioners dealing with the diverse fields of Cyber Security and cover topics that are equally valuable for professionals as well as for those new in the field from all sectors industry, commerce and academia. The articles can include traditional research-focused articles; educational surveys to instruct the broader technical community; informative articles that discuss practical policy, legal, and economic aspects of Cyber Security; and editorial or position articles that pose new ideas and paradigm shifts for the field of Cyber Security. Answering the highly practical and commercial importance of network security R&D, submissions of applications-oriented papers describing case studies and simulations are encouraged, as well as research analysis-type papers. DS-CYS also accepts the substantially extended version of the conference papers in the field of cyber security.

DS Journal of Cyber Security solicits articles adhering to the following broadly constructed and interpreted aspects of Cyber Security:

 

  • Advanced Persistent Threat (APT)
  • Adversarial Machine Learning
  • Adversarial Reasoning
  • AI Security
  • Analysis of Vulnerabilities and Attacks
  • Anomaly and Intrusion Detection and Countermeasures to Prevent Detection
  • Anonymization and De-Identification Technologies
  • Applied Cryptography and Cryptographic Protocols
  • Authenticated Key Agreement Protocols
  • Authentication and Identity Management Technologies
  • Big Data Security and Privacy
  • Cloud Computing and Security and Privacy Threats in the Cloud
  • Computer Science and Security
  • Critical Infrastructure Protection
  • Cryptography and Associated Topics
  • Cryptology
  • Cyber Attacks
  • Cyber Breaches
  • Cyber Defence Tools for Improving the Level of Cyber Security
  • Cyber Security Education
  • Cyber Security in Internet of Things (IoT)
  • Cyber Warfare
  • Cyber-Physical Security
  • Cyber Security Data Analytics
  • Darknet and Darkweb
  • Data Loss Prevention (DLP)
  • Data-Driven Security and Measurement Studies
  • Denial of service (DoS) Against Communication and Computing Services and Countermeasures Against DoS
  • Design and Test Strategies for Secure and Survivable Systems
  • Digital Forensics & Counter Forensics
  • Digital Ledger Technology
  • Economics of Security
  • Emerging Trends in Cyber Security
  • Encryption and Encryption-By-Default
  • Firewalls
  • Forensics Including Computer and Network Forensics
  • Hacking
  • Hardware Security
  • Information Hiding, Including Steganology
  • Information-Theoretic Security
  • Insider Threats
  • Jamming and Interference
  • Key Generation and Key Distribution Schemes
  • Key Management Cryptographic Credential Management
  • Legal and Public Policy Aspects of Security and Privacy
  • Machine Learning Mechanisms for Cyber Security
  • Machine Learning Security
  • Malware and Malware Analysis
  • Malware Reverse Engineering and Malware Defense and Mitigation Strategies
  • Modern Tools for Improving Cyber Security
  • Network and Critical Infrastructure Security
  • Physical Layer Security and Cross-Layer Security for Communications
  • Privacy and Privacy Enhancing Technologies Including Applications to New Domains
  • Privacy Attacks and Protection
  • Privacy-Enhancing Technologies and Anonymity
  • Quantum Computing Based Encryption and Decryption Techniques
  • Quantum Security
  • Quantum-Safe Digital Signature Schemes
  • Quantum-Safe Encryption Algorithms
  • Quantum-Safe Key Management Mechanisms
  • Secure Operating Systems and Applications
  • Security and Crime Science
  • Security and Mobility Optimization
  • Security in Mobile Networks
  • Security Issues in Intelligent Transportation Systems (ITS)
  • Security Issues in Various Networking Technologies
  • Security Metrics and The Science Of Security
  • Smart Grid and Power/Energy Systems Security
  • Social Networks Security
  • Software, Hardware and System Security
  • Cyber Threat Detection/Protection
  • Traffic Measurements for Cyber Security
  • Usable Security
  • Viruses
  • Vulnerability Analysis
  • Wireless Physical Layer Security