Generated by GPT-5-mini| IEEE Transactions on Dependable and Secure Computing | |
|---|---|
| Title | IEEE Transactions on Dependable and Secure Computing |
| Discipline | Computer science |
| Abbreviation | IEEE Trans. Dependable Secure Comput. |
| Publisher | Institute of Electrical and Electronics Engineers |
| Country | United States |
| Frequency | Bimonthly |
| History | 2004–present |
IEEE Transactions on Dependable and Secure Computing is a peer-reviewed scholarly journal published by the Institute of Electrical and Electronics Engineers. It focuses on research at the intersection of computer security, reliability engineering, and fault-tolerant computing, drawing contributions from researchers affiliated with institutions such as Massachusetts Institute of Technology, Stanford University, University of California, Berkeley, Carnegie Mellon University, and University of Cambridge. The journal serves a readership that includes members of IEEE Computer Society, practitioners from Microsoft Research, Google Research, and policy stakeholders at organizations like National Institute of Standards and Technology and European Union Agency for Cybersecurity.
The journal was established in the early 2000s amid growing interest in dependable and secure systems following influential events and initiatives such as the Morris worm, the creation of CERT Coordination Center, and policy responses exemplified by U.S. Cyber Command. Its launch responded to scholarly momentum from conferences and societies including IEEE Symposium on Security and Privacy, ACM Conference on Computer and Communications Security, USENIX Security Symposium, IFIP Working Group 10.4, and programs at laboratories such as Los Alamos National Laboratory and Bell Labs. Over its lifespan the title has paralleled developments driven by projects funded by agencies like the Defense Advanced Research Projects Agency, the National Science Foundation, and the European Research Council.
The journal's remit spans secure software engineering, hardware trust, formal methods, cryptographic protocols, fault tolerance, survivability, and systems assurance. Typical topics echo themes from work at IBM Research, Intel Labs, Cisco Systems, ARM Holdings, and research centers at ETH Zurich and Tsinghua University. Article types include original research, surveys, and brief communications addressing threats exemplified by incidents tied to Stuxnet, techniques influenced by results from RSA Conference, and verification approaches related to tools like Coq, SPIN, and TLA+.
Editorial leadership has included eminent scholars affiliated with Princeton University, University of Oxford, University of Illinois Urbana–Champaign, and California Institute of Technology. The journal operates under the governance of the IEEE Computer Society with an editorial board drawing members from institutions such as National University of Singapore, Peking University, University of Toronto, Imperial College London, and University of Melbourne. It publishes bimonthly issues featuring peer review workflows analogous to standards at Nature Communications and ACM Transactions on Computer Systems and follows ethical policies similar to those of Committee on Publication Ethics.
The journal is indexed in major bibliographic services and citation databases including Scopus, Web of Science, IEEE Xplore, Ei Compendex, and Google Scholar. Its metadata appear in aggregators and library services used by institutions like Harvard University Library, Library of Congress, British Library, and research portals such as JSTOR and CrossRef.
Papers published in the journal have informed standards and guidelines produced by bodies like IETF, ISO/IEC JTC 1, and NIST Cybersecurity Framework. The journal's articles are frequently cited alongside foundational work appearing in venues such as Proceedings of the IEEE, Communications of the ACM, ACM SIGCOMM, and IEEE Transactions on Information Theory. Reception among academic departments at Yale University, Columbia University, University of Michigan, and University of Washington has been favorable, with influence on curricula and industry practice in firms including Amazon Web Services and Facebook.
The journal has published influential contributions on topics such as formal verification of secure processors, resilient distributed consensus, side-channel analysis, and blockchain security, citing research trajectories tied to Lamport Prize-style recognition, seminal results related to Byzantine fault tolerance, and advancements building on algorithms from Leslie Lamport, Martin Hellman, and Whitfield Diffie. Noteworthy papers have been applied in contexts from cloud platforms at Google Cloud Platform to critical infrastructure projects overseen by organizations like International Electrotechnical Commission.
The journal follows IEEE publication policies regarding copyright, open access options, and author rights, with submission procedures managed via editorial systems comparable to those used by Springer Nature and Elsevier. Authors from universities such as University of Pennsylvania, Johns Hopkins University, McGill University, and Rice University submit manuscripts that undergo double-blind or single-blind peer review depending on editorial rules; funding disclosure and conflict-of-interest statements follow norms advocated by Wellcome Trust and European Research Council.
Category:Academic journals