1. Top of page

In network planning and design, security usually conflicts with other design objectives, such as usability, performance, and even functionality. Meanwhile, security goals have their own inherent contradictions, as confidentiality, integrity, privacy, accountability, availability, and recovery from safety attacks often conflict fundamentally. For a good network design, balancing these design objectives and cost is the prerequisite. However, it is quite difficult to satisfy all the security requirements simultaneously, let alone the multiple interacting and possibly conflicting targets. Ultimately, security comes down to using the information available best to balance the trade-offs among the competing goals of multiple factors.

Considered as one of the grand challenges of the field, study the objective metric to evaluate the trade-offs of network security has draw extensive research attentions recently. In this call for papers, we would like to invite novel ideas; theoretical analysis for evaluating, modeling, and optimizing the trade-offs among network security; and other design objectives. Submissions of applications-oriented papers describing case studies and simulations are encouraged as well.

Original papers, as well as expository and survey papers, are sought, both invited and contributed. All manuscripts are subjected to rigorous reviews as per the policy of this journal before they can be accepted for publication. Sample topics include, but are not limited to, the following:

  • Computational, mathematical, and statistical techniques for modeling the trade-offs among network security and other design objectives.
  • Development of usable state-of-the-art tools and theory in statistical inference and statistical learning for the parameters among network security and other design objectives.
  • Novel automatical strategies to evaluate the existing parameters of the network performances including network security.
  • Assessment of security requirements in different applications (Cyber-Physical Systems, Web services, etc.).
  • Development of multi-objective optimization strategies balancing the network security requirements and other network design objectives.
  • Evaluation of the privacy impact, legal/regulatory, and the security risk.
  • Parameters optimization study and analysis of network security in virtualization environments.
  • Parameters optimization study and analysis of network security in smart grid.
  • Establishing appropriate and secure network infrastructure models, prototypes, and facilities achieving trade-off between network security and other design objectives.
  • Practical design, implementations, and system performance evaluation of secure network optimization multiple requirements (wired and wireless).


  1. Top of page

High-quality original papers are solicited. Papers must be unpublished and must not be submitted for publication elsewhere. If a paper is extended from a conference paper, then the extension has to have at least 40% new materials.

All papers will be peer reviewed according to the guidelines of Wiley's Security and Communication Networks Journal to ensure high quality and relevance to the Special Issue. All submissions should be prepared by following the guidelines given in Section “For Authors” at Prospective authors should submit their paper online at

When submitting the papers, the authors should make sure to choose the manuscript type as “Special Issue”, enter the “Running Head” and the “Special Issue title” as “SCN-SI” and “Systematic Network Optimizations for Security Parameters”, respectively.

  • Paper Submission Deadline: 31 March 2014
  • First Round of Reviews: 30 June 2014
  • Revision Submission Deadline: 31 July 2014
  • Notification of Acceptance: 31 August 2014