Cyberthreats and Security

in Special Issue   Posted on August 17, 2017 

Information for the Special Issue

Submission Deadline: Sun 01 Oct 2017
Journal Impact Factor : 3.700
Journal Name : IT Professional
Journal Publisher:
Website for the Special Issue:
Journal & Submission Website:

Special Issue Call for Papers:

Submission deadline: 1 October 2017

Publication: May/June 2018, IT Professional

The landscape of cybersecurity continues to change rapidly, with new threats and attack paths that seemingly appear almost daily. At the same time, advances on the technology side have accelerated. In particular, the Internet of Things (IoT) and miniature cyber-physical systems are bringing information security concerns to every aspect of life, including clothing, kitchen appliances, and automobiles. The corporate world is also facing challenges in how to apply new technology such as the IoT and distributed ledger systems—technology that even many computer security professionals don’t fully understand.

This special issue of IT Professional seeks to provide readers with an overview of current issues and advances in information and computer security. We seek high-quality contributions from industry, government, business, and academia that present recent developments in IT security, showcase successfully deployed security solutions, or discuss challenging security issues that deserve further study. Topics of interest include, but are not limited to, the following:

Security in the IoT and cyber-physical systems
Blockchain and distributed ledger systems
Authentication and access control
Physical and behavioral biometrics
Applications of cryptography
Cloud and distributed system security
Computer forensics
Privacy preservation in data mining and data analytics
Intrusion-detection systems
Malware detection
Mobile app and device security
Network security
Legalities and ethics associated with security and privacy policies
Protection of personal information
Security architecture
Usability and human factors issues
Wearable device security
Web application security
Security of online transactions


Feature articles should be no longer than 4,200 words and have no more than 20 references (with tables and figures counting as 300 words). Illustrations are welcome. For author guidelines, including sample articles, see Submit your article at

Closed Special Issues