• 1st open access journal on Cybersecurity
• APC fully covered by IIE, CAS
• Served by a dedicated international editorial board to give thorough swift editorial response
About
Aims and scope
This journal is aimed to systematically cover all essential aspects of cybersecurity, with a focus on reporting on cyberspace security issues, the latest research results, and real-world deployment of security technologies.
The journal publishes research articles and reviews in the areas including, but not limited to:
• Cryptography and its applications
• Network and critical infrastructure security
• Hardware security
• Software and system security
• Cybersecurity data analytics
• Data-driven security and measurement studies
• Adversarial reasoning
• Malware analysis
• Privacy-enhancing technologies and anonymity
• IoT Security
• AI Security
Why submit to us
Benefits of publishing with SpringerOpen
High visibility
Cybersecurity's open access policy allows maximum visibility of articles published in the journal as they are available to a wide, global audience.
Speed of publication
Cybersecurity offers a fast publication schedule whilst maintaining rigorous peer review; all articles must be submitted online, and peer review is managed fully electronically (articles are distributed in PDF form, which is automatically generated from the submitted files). Articles will be published with their final citation after acceptance, in both fully browsable web form, and as a formatted PDF; the article will then be available through Cybersecurity and SpringerOpen.
Flexibility
Online publication in Cybersecurity gives you the opportunity to publish large datasets, large numbers of color illustrations and moving pictures, to display data in a form that can be read directly by other software packages so as to allow readers to manipulate the data for themselves, and to create all relevant links (for example, to PubMed, to sequence and other databases, and to other articles).
Promotion and press coverage
Articles published in Cybersecurity are included in article alerts and regular email updates.
In addition, articles published in Cybersecurity may be promoted by press releases to the general or scientific press. These activities increase the exposure and number of accesses for articles published in Cybersecurity.
Copyright
Authors of articles published in Cybersecurity retain the copyright of their articles and are free to reproduce and disseminate their work. For further information, see our guide to licensing, copyright and author rights.
For further information about the advantages of publishing in a journal from SpringerOpen, please click here.
Open access
All articles published by the Cybersecurity are made freely and permanently accessible online immediately upon publication, without subscription charges or registration barriers. Further information about open access can be found here.
As authors of articles published in the Cybersecurity you are the copyright holders of your article and have granted to any third party, in advance and in perpetuity, the right to use, reproduce or disseminate your article, according to the license terms.
For those of you who are US government employees or are prevented from being copyright holders for similar reasons, SpringerOpen can accommodate non-standard copyright lines. Please contact us if further information is needed.
Article-processing charges
The publication costs for Cybersecurity are covered by the Institute of Information Engineering, CAS so authors do not need to pay an article-processing charge.
Indexing services
The full text of all articles is deposited in digital archives around the world to guarantee long-term digital preservation. You can also access all articles published by SpringerOpen on SpringerLink. We are working closely with relevant indexing services including PubMed Central and Web of Science (Clarivate Analytics) to ensure that articles published in Cybersecurity will be available in their databases when appropriate.
Peer-review policy
Peer-review is the system used to assess the quality of a manuscript before it is published. Independent researchers in the relevant research area assess submitted manuscripts for originality, validity and significance to help editors determine whether the manuscript should be published in their journal. You can read more about the peer-review process here.
Cybersecurity operates a double-blind peer-review system, where the reviewers do not know the names or affiliations of the authors and the reviewer reports provided to the authors are anonymous. Submitted manuscripts will generally be reviewed by two to three experts who will be asked to evaluate whether the manuscript is scientifically sound and coherent, whether it duplicates already published work, and whether or not the manuscript is sufficiently clear for publication. Reviewers will also be asked to indicate how interesting and significant the research is. The Editors will reach a decision based on these reports and, where necessary, they will consult with members of the Editorial Board.
Citing articles in Cybersecurity
Articles in Cybersecurity should be cited in the same way as articles in a traditional journal. Because articles are not printed, they do not have page numbers; instead, they are given a unique article number.
Article citations follow this format:
Authors: Title. cybersecur [year], [volume number]:[article number].
e.g. Roberts LD, Hassall DG, Winegar DA, Haselden JN, Nicholls AW, Griffin JL: Increased hepatic oxidative metabolism distinguishes the action of Peroxisome Proliferator-Activated Receptor delta from Peroxisome Proliferator-Activated Receptor gamma in the Ob/Ob mouse. cybersecur 2009, 1:115.
1:115 refers to article 115 from Volume 1 of the journal.
Editorial policies
All manuscripts submitted to Cybersecurity should adhere to SpringerOpen's editorial policies.
Once your article is accepted, it will be processed by production and published shortly afterwards. In some cases, articles may be held for a short period of time prior to publication. If you have any concerns or particular requirements please contact the Journal.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appeals and complaints
Authors who wish to appeal a rejection or make a complaint should follow the procedure outlined in the BMC Editorial Policies.
Affiliated with
-
The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.
IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.
IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.
The journal is indexed by
- EI Compendex
- Emerging Sources Citation Index
- DBLP
- DOAJ
- SCOPUS
- EBSCO Discovery Service
- Gale
- INSPEC
- Institute of Scientific and Technical Information of China
- Google Scholar
- Dimensions
- CNKI
- Naver
- Norwegian Register for Scientific Journals and Series
- OCLC WorldCat Discovery Service
- ProQuest-ExLibris Primo
- ProQuest-ExLibris Summon
- TD Net Discovery Service
- UGC-CARE List (India)
Annual Journal Metrics
-
Citation Impact 2023
Journal Impact Factor: 3.9
5-year Journal Impact Factor: 4.9
Source Normalized Impact per Paper (SNIP): 1.587
SCImago Journal Rank (SJR): 1.136Speed 2023
Submission to first editorial decision (median days): 8
Submission to acceptance (median days): 95Usage 2023
Downloads: 408,523
Altmetric mentions: 15 -
- ISSN: 2523-3246 (electronic)