《网络空间安全科学与技术(英文)》投稿指南
Aims and scope
This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.
The journal publishes research articles, and reviews in the areas including, but not limited to:
Cryptography and its applications
Network and critical infrastructure security
Hardware security
Software and system security
Cybersecurity data analytics
Data-driven security and measurement studies
Adversarial reasoning
Malware analysis
Privacy-enhancing technologies and anonymity
IoT Security
AI Security
Submission guidelines
Our 3-step submission process
Before you submit
Before you submit, we recommend familiarizing yourself with the following.
Make sure you are submitting to the most suitable journal - Aims and scope
Understand the costs and funding options - Fees and funding
Make sure your manuscript is accurate and readable - Language editing
Understand the copyright agreement - Copyright
Ready to submit
To give your manuscript the best chance of publication, follow these editorial policies and formatting guidelines.
Cybersecurity publishes the following article types:
Research
Review
Survey
Click the relevant link to find style and formatting information for the article you are going to submit.
General formatting rules for all article types - Prepare your manuscript
Make sure your submission is complete - Prepare supporting information
Copyright and license agreement - Agree to conditions
Read and agree to our Editorial Policies - Editorial Policies
Submit and promote
After acceptance, we provide support so your article gains maximum impact in the scientific community and beyond.
Who decides whether my work will be accepted? - Peer-review policy
Spreading the word - Promoting your publication
Submit manuscript
更多详情:
https://cybersecurity.springeropen.com/submission-guidelines