Skip to content

Advertisement

About

Aims and scope

This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.

The journal publishes research articles and reviews in the areas including, but not limited to:

• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security

Why submit to us

• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response

Why publish your article in Cybersecurity?


High visibility

Cybersecurity's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience. 

Speed of publication

Cybersecurity offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through Cybersecurity and SpringerOpen.

Flexibility

Online publication in Cybersecurity gives you the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example, to PubMed, to sequence and other databases, and to other articles).

Promotion and press coverage

Articles published in Cybersecurity are included in article alerts and regular email updates. 
In addition, articles published in Cybersecurity may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in Cybersecurity

Copyright

Authors of articles published in Cybersecurity retain the copyright of their articles and are free to reproduce and disseminate their work (for further details, see the copyright and license agreement).

For further information about the advantages of publishing in a journal from SpringerOpen, please click here.

Open access


All articles published by the Cybersecurity are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.

As authors of articles published in the Cybersecurity​​​​​​​ you are the copyright holders of your article and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate your article, according to the SpringerOpen copyright and license agreement.

For those of you who are US government employees or are prevented from being copyright holders for similar reasons, SpringerOpen can accommodate non-standard copyright lines. Please contact us if further information is needed.

Article-processing charges

The publication costs for Cybersecurity are covered by the Institute of Information Engineering, CAS so authors do not need to pay an article-processing charge.

Indexing services

The full text of all articles is deposited in digital archives around the world to guarantee long-term digital preservation. You can also access all articles published by SpringerOpen on SpringerLink. We are working closely with relevant indexing services including PubMed Central and Web of Science (Clarivate Analytics) to ensure that articles published in Cybersecurity will be available in their databases when appropriate.

Peer-review policy

Peer-review is the system used to assess the quality of a manuscript before it is published. Independent researchers in the relevant research area assess submitted manuscripts for originality, validity and significance to help editors determine whether the manuscript should be published in their journal. You can read more about the peer-review process here.

Cybersecurity operates a double-blind peer-review system, where the reviewers do not know the names or affiliations of the authors and the reviewer reports provided to the authors are anonymous. Submitted manuscripts will generally be reviewed by two to three experts who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates already published work, and whether or not the manuscript is sufficiently clear for publication. Reviewers will also be asked to indicate how interesting and significant the research is. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board.

Citing articles in Cybersecurity

Articles in Cybersecurity should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.

Article citations follow this format:

 

Authors: Title. cybersecur [year], [volume number]:[article number].

 

e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. cybersecur 2009, 1:115.

 

1:115 refers to article 115 from Volume 1 of the journal.

Editorial policies


All manuscripts submitted to Cybersecurity should adhere to SpringerOpen's editorial policies.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appeals and complaints


If you wish to appeal a rejection or make a complaint you should, in the first instance, contact the Editor who will provide details of the journal's complaints procedure.

  • Affiliated with
    New Content Item
  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

Advertisement