ACM DL

Digital Threats: Research and Practice (DTRAP)

Menu

Social Media

SIGN UP FOR TOC SERVICES :
EMAIL OR RSS

Scope

Digital Threats: Research and Practice (DTRAP) is a peer-reviewed journal that targets the prevention, identification, mitigation, and elimination of digital threats.  DTRAP promotes the foundational development of scientific rigor in digital security by bridging the gap between academic research and industry practice.  Accordingly, the journal welcomes the submission of scientifically rigorous manuscripts that address extant digital threats, rather than laboratory models of potential threats.  To be accepted for publication, manuscripts must demonstrate scientific rigor and present results that are reproducible." 

DTRAP invites researchers and practitioners to submit manuscripts that present scientific observations about the identification, prevention, mitigation, and elimination of digital threats in all areas, including computer hardware, software, networks, robots, industrial automation, firmware, digital devices, etc.  For articles involving analysis, the journal requires the use of relevant data and the demonstration of the importance of the results.  For articles involving the results of structured observation such as experimentation and case studies, the journal requires explicit inclusion of rigorous practices; for example, experiments should clearly describe why internal validity, external validity, containment, and transparency hold for the experiment described.

Topics relevant to the journal include (but are not limited to):

  • Network security
  • Web-based threats
  • Point-of-sale threats
  • Closed-network threats
  • Malicious software analysis
  • Exploit analysis
  • Vulnerability analysis
  • Adversary tactics
  • Threat landscape studies
  • Criminal ecosystem studies
  • Systems analysis
  • Critical Infrastructure Threats
  • Victim response patterns
  • Adversary attack patterns
  • Studies of security operations processes/practices/TTPs
  • Assessment and measurement of security architectures/organization security posture
  • Threat information management and sharing
  • Security services or threat intelligence ecosystem studies
  • Impact of new technologies/protocols on the threat landscape
 
All ACM Journals | See Full Journal Index