• Home
  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

  • Resources
    • Find Resources by Topic Tags
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ CSIAC Journal – Call for Papers for Publication

CSIAC Journal – Call for Papers for Publication

The Cyber Security and Information Systems Information Analysis Center (CSIAC), a Defense Technical Information Center (DTIC) sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing, is currently accepting submissions for upcoming releases of the CSIAC Journal.

CSIAC is chartered to leverage the best practices and expertise from government, industry and academia in order to promote technology domain awareness and solve the most critically challenging scientific and technical (S&T) problems. As part of that mission, CSIAC publishes the Journal of Cyber Security and Information Systems, focusing on scientific and technical research & development, methods and processes, policies and standards, security, reliability, quality, and lessons learned case histories. Contributing authors realize the benefits of being published in a highly-respected resource within the technical community, with an enormous reach across the Department of Defense and the broader scientific community (23k+ subscribers). Demonstrate your expertise and accomplishments or pose the challenging questions for further thought in the resource that reaches fellow Subject Matter Experts (SMEs) developing the solutions to support the warfighter. Past issues of the CSIAC journal may be viewed or downloaded here.

CSIAC is currently accepting articles submitted by the professional community for consideration in the following topic areas:
  • Access Control, Anonymity, Audit and Audit Reduction & Authentication and Authorization
  • Advanced Persistent Threat (APT) paradigm
  • AI Algorithms
  • Applied Cryptography, Cryptanalysis, Digital Signatures
  • Artificial Intelligence tools & Applications
  • Automatic Control
  • Bioinformatics
  • Biometric Security
  • Boundary Control Devices
  • CAD Design & Testing
  • Certification and Accreditation
  • Cloud Computing
  • Computational Theories of Learning
  • Computer Vision and Speech Understanding
  • Control physical systems and processes (e.g., SCADA)
  • Cross-Layer Design for Security
  • Cyber & Data Breach Fatigue
  • Cybersecurity Scorecards
  • Data and System Integrity, Database Security
  • Data Mining and Machine Learning Tools
  • Data Mining Applications
  • Data Mining in Modeling, Visualization, Personalization and Recommendation
  • Data Mining Systems and Platforms, Efficiency, Scalability and Privacy
  • Defensive Information Warfare
  • Denial of Service Protection, Intrusion Detection, Anti-Malware
  • Distributed Systems Security
  • E-mail Security, Spam, Phishing, E-mail Fraud, Virus, Worms, Trojan Protection
  • Electronic Commerce
  • Emerging ‘hyperwar’ signals ‘AI-fueled, machine-waged’ future of conflict
  • Foundations, Algorithms, Models, and Theory
  • Fuzzy Logic
  • Game and Software Engineering
  • Grid Security
  • Heuristic and AI Planning Strategies and Tools
  • Hybrid Intelligent Systems
  • Information Hiding and Watermarking & Information Survivability
  • Information Retrieval
  • Insider Threat Protection
  • Intellectual Property Protection
  • Intelligent System Architectures
  • Internet/Intranet Security
  • Key Management and Key Recovery
  • Knowledge Processing
  • Knowledge Representation
  • Knowledge-based Systems
  • Language-Based Security
  • Mechatronics
  • Mining Text, Semi-Structured, Spatio-Temporal, Streaming, Graph, Web, Multimedia
  • Mobile and Wireless Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Monitoring and Surveillance
  • Multimedia & Cognitive Informatics
  • Multimedia Security, Operating System Security, Peer-to-Peer Security
  • Natural Language Processing
  • Neural Networks
  • Parallel Processing
  • Pattern Recognition
  • Performance Evaluations of Protocols & Security Application
  • Pervasive computing and ambient intelligence
  • Privacy and Data Protection
  • Product Evaluation Criteria and Compliance
  • Product Evaluation Criteria and Compliance
  • Programming Languages
  • Reasoning and Evolution
  • Risk Evaluation and Security Certification
  • Risk/Vulnerability Assessment
  • Robotics
  • Security & Network Management
  • Security & Network Management
  • Security Models & protocols
  • Security Threats & Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc.,)
  • Semantic Web Techniques and Technologies
  • Soft computing theory and applications
  • Software & Hardware Architectures
  • Trusted Computing
  • Ubiquitous Computing Security
  • Unmanned, autonomous weapons
  • Web Intelligence Applications & Search
(This is a non-exhaustive list)

CSIAC will review articles and assist candidate authors in creating the final draft if the article is selected for publication. All authors receive 5 complimentary copies of the Journal issue in which their article appears and up to 20 additional copies may be requested by the author at no cost.  Note that CSIAC does not pay for articles published.

To Submit an Article:

Drafts may be emailed to info@csiac.org

Please read the Journal Article Submission Policy:
https://www.csiac.org/csiac-journal-article-submission-policy/

 

Related Content:

  • Journal Issue Archives
  • CSIAC Journal Article Submission Policy
  • Subscribe to the CSIAC Journal

Reader Interactions

sidebar

Page Sidebar

Featured Content

The DoD Cybersecurity Policy Chart

The DoD Cybersecurity Policy Chart

This chart captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.

View the Policy Chart

CSIAC Journal - Launching Innovation Through Medical Modeling and Simulation Technologies

CSIAC Journal Cover Volume 5 Number 4

This Special Edition of the Journal will provide a glimpse into current efforts to improve military medical training with simulation-based solutions.

Read the Journal

CSIAC Journal - Innovation Based Ecosystems

CSIAC Journal Cover Volume 5 Number 4

This issue of the Journal of Cyber Security & Information Systems explores how managing fast adoption modern-based system has more to do with understanding capabilities, interdependency between systems and effectively operating in the new paradigm than it has to do with differentiating product features.

Read the Journal

Recent Video Podcasts

  • What is DevOps? from a tools point of view Series: CSIAC Webinars
  • 5th Generation (5G) Technology Series: The CSIAC Podcast
  • Malvertising Explored Series: The CSIAC Podcast
  • Cybersecurity Arms Race – Modernizing the Arsenal Series: CSIAC Webinars
  • Cyber Situational Awareness Series: The CSIAC Podcast
View all Podcasts

Upcoming Events

Thu 28

BSides Columbus 2019

February 28 - March 1
Columbus OH
United States
Organizer: BSides Columbus
Mar 19

1st NATO – Industry Workshop on Autonomous Cyber Defence

March 19 @ 09:30 - 16:00 EDT
Cranfield Bedfordshire MK43 0AL
United Kingdom
Organizer: Cranfield University
View all Events

Recently Active Members

Profile picture of jburkhart04
Profile picture of Cyberhawk119
Profile picture of CSIACAdmin
Profile picture of cfasolo22
Profile picture of jrice
Profile picture of emuslic03
Profile picture of nmaida
Profile picture of svenditti
Profile picture of aizzo12
Profile picture of jsupino09
Profile picture of scottrill10
Profile picture of sphillips21
Profile picture of ebromley22
Profile picture of jlewis05
Profile picture of aduong29
Profile picture of kellermannrobert
Profile picture of gustavplato
Profile picture of bbarksdale

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information

This website uses cookies to provide our services and to improve your experience. By using this site, you consent to the use of our cookies. To read more about the use of our site, please click "Read More". Otherwise, click "Dismiss" to hide this notice. Dismiss Read More