ACM DL

Digital Threats: Research and Practice (DTRAP)

Menu

Social Media

SIGN UP FOR TOC SERVICES :
EMAIL OR RSS

How to Submit

All manuscripts considered for publication in DTRAP must be prepared using the ACM template and submitted as a PDF via the Manuscript Central submission site at https://mc.manuscriptcentral.com/dtrap.

As an author, you are encouraged to view the rubric to assist you in determining how your article fits within the journal scope.  Please contact the Co-Editors-in-Chief at [email protected] should you have questions.

Submissions must be prepared for double-blind review.  To do this, you should apply the following six steps to manuscripts before submission:

  1. Anonymize the title page.
  2. Remove mention of funding sources and personal acknowledgments from the manuscript.
  3. Anonymize references found in running prose that cite your papers.
  4. Anonymize citations of submitted work in the bibliography.
  5. Ambiguate statements on well-known or unique systems that identify an author.
  6. Name your files with care and ensure document properties are also anonymized.

Paper Types

Peer-Reviewed Research Paper

DTRAP welcomes research papers in the field of Digital Threats.  The primary purpose of the paper should be to use scientific rigor through analysis and structured observation to illuminate an advance in the field.  The rubric should be your guide to creating the paper so that it meets these requirements. 

Contributions appearing in ACM journals are normally original papers that have not been published elsewhere. Publication of a paper that has been widely disseminated is permitted only if the Editor judges that the revision contains significant amplification or clarification of the original material or there is some significant additional benefit to be gained. Any prior appearance should be noted on the title page and it is the obligation of the author to inform the Editors-in-Chief if there are any circumstances concerning the contribution that bear on this policy.

While there is no formal page limit for DTRAP articles, we expect most submissions to be between 10 and 25 journal pages, with 30 pages being a soft upper limit. Submissions that exceed 30 pages must have good reasons to do so. If your paper is near or above 30 pages, please think carefully about why it is as long as it is, and consider ways to reduce its length. In many cases, shortening a paper will have no ill-effects, and may well improve the paper's clarity and presentation.

With the Benefit of Hindsight

Adjusting from past experience—both mistakes and successes—is an important facet for researchers and practitioners in the field of cybersecurity.   DTRAP will acknowledge this by reaching out to authors who have written the field’s seminal papers and books and publishing their reflections on these works.  Unsolicited papers will also be considered. Themes such as the following should be considered:

  • Lessons learned—and difficulties faced—when writing the work
  • How would the topic be approached differently in today's cybersecurity climate?
  • Has the landscape changed significantly since the work was written?  In a good or bad way?
  • What further development of the work still remains to be done?
  • Would the author have changed anything in the work, knowing what is known today?

Leaving the Laboratory: Putting Research into Practice

DTRAP strives to be the nexus of research and practice in the field of cybersecurity.  In this column, we solicit a practitioner to examine a peer-reviewed research article from a recent issue of the publication and provide his or her insight with respect to implementing that research.  This column will emphasize the fusion of research and practice in cybersecurity, which will be attractive to the practitioner in terms of putting the cutting-edge research from the journal into practice.  Unsolicited papers will also be considered.

Field Notes

The Field Notes published in DTRAP are short case reports (1000-1500 words) about emerging threats and defenses.  Field Notes accurately document factual data as well as the settings, actions, behaviors, and consequences that are observed.  They may also contain the thoughts, ideas, questions, and concerns that arise as the observation is conducted.  Field Notes provide perspectives on a single phenomenon that, when accumulated over time, suggest new avenues of research.

Prepare your manuscript

Authoring templates can be found at http://www.acm.org/publications/authors/submissionsWhen using LaTeX, use "acmsmall".

ACM Computing Classification System (CCS)

An important aspect of preparing your paper for publication by ACM Press is to provide the proper indexing and retrieval information from the ACM Computing Classification System (CCS). This is beneficial to you because accurate categorization provides the reader with quick content reference, facilitating the search for related literature, as well as searches for your work in ACM's Digital Library and on other online resources.

Language Service

ACM has partnered with International Science Editing (ISE) to provide language editing services to ACM authors. ISE offers a comprehensive range of services for authors including standard and premium English language editing, as well as illustration and translation services, and also has significant international outreach, especially in China. Editing is available for both Word and LaTeX files. As an ACM author, you will receive a generous discount on ISE editing services.

To take advantage of this partnership, visit http://acm.internationalscienceediting.com/. (Editing services are at author expense and do not guarantee publication of a manuscript.)

Author Rights

ACM authors have three ways to manage their publication rights with ACM:

  1. A license granting ACM non-exclusive permission to publish—by choosing to pay for perpetual open access from the ACM Digital Library, authors may opt to self-manage all rights to their work. 
  2. A new Publishing License Agreement granting ACM exclusive publication rights—in choosing this license authors grant ACM the right to serve as the exclusive publisher of their work and to manage ongoing rights and permissions associated with the work, including the right to defend it against improper use by third parties. This exclusive license is roughly the equivalent of ACM’s traditional Copyright Transfer Agreement except that the author continues to hold copyright. 
  3. ACM's traditional Copyright Transfer Agreement—for authors comfortable with the existing agreement.

Learn more by visiting the Information for Authors webpage.

Author-Izer Service

Once your manuscript is published, we recommend that you use the ACM Author-Izer service. This service allows you to generate and post a link on your home page or institutional repository to your published article. This link will let any visitors to your personal bibliography pages download the definitive version of the articles for free from the ACM DL. These downloads will be recorded as part of your DL usage statistics. A detailed description of the service and instructions for its use may be found at: http://www.acm.org/publications/acm-author-izer-service.

For Further Assistance

  • Questions regarding editorial review process should be directed to the Co-Editors-in-Chief.
  • Questions regarding the post-acceptance production process should be addressed to the Journal Admin.
 
All ACM Journals | See Full Journal Index