Transactions on Engineering and Computer
Science is open access, scholarly peer-reviewed, and academic research journal
for engineers, researchers, scientists, and academicians.
The primary objective of this journal (Trans Eng Comput Sci) is to be an
authoritative international forum for delivering both theoretical, innovative,
rare, and new findings that expand the knowledge in the field of Engineering
(Software, Mechanical, Civil, Electronics & Electrical) and all
interdisciplinary streams of Computer Sciences.
All manuscripts published by Transactions
on Engineering and Computer Science are made freely accessible online
immediately upon publication, without any subscription charges or blockade. A minimum of three independent Reviewer’s approval and an Editor's approval is taken
into consideration for acceptance or rejection of an article.
Authors are requested to submit their
valuable Research, Review, Mini-review, Short communication, Opinion, Letter to the Editor, etc as an attachment to the editorial office at: firstname.lastname@example.org or email@example.com
Related Topics and Keywords
on Engineering Management, Transactions on Computers, Transactions on Cloud
Systems, Transactions on Environment and Electrical Engineering, Transactions
on Industrial Networks and Intelligent Systems, Electrical, Software, Mechanical, Civil, Internet of
Things, Data structure, Mathematical Modeling, Robotics Research, Engineering
informatics, Computer Science, Computer Engineering, Computer Technology,
Computer Hardware/Software, Robotics and application, Embedded Systems,
Artificial Intelligence, Data Base Management & Information Retrievals,
Geographical Information Systems/ Global Navigation Satellite Systems, Neural
Networks, Fuzzy Systems, Web
and Internet computing, Supercomputing.
Upcoming Special Issue
Title: Enabling Security in DevOps for a Better and Safer IT
Culture and Economic Growth
Dear Colleagues and Researchers,
You are invited to submit a paper for possible inclusion in
this special issue in the domain of
DevOps, Automation, Cloud Computing, Version Control Systems, and Cloud Security. We are inviting research
scholars to submit their research articles to this special issue within the
timeline. Please adhere to the process and timelines. You will need to indicate
your intention to submit your full paper by email to the email id:
firstname.lastname@example.org with the title of the paper, authors, and
abstract. The full manuscript, as a Word/PDF file, should be emailed to the
journal email id mentioned above. The review process for the articles submitted
for this special issue will be done by guest editors.
As cloud environments become increasingly complex,
organizations are adopting DevSecOps to innovate faster without compromising
security. DevOps is a collaboration framework that expands the impact of DevOps
by adding security practices to the software development and delivery process.
DevSecOps resolves the tension between DevOps teams that want to release
software quickly, and security teams that prioritize security over all else. By
integrating application security principles and practices into software
development and operations, teams can deliver new software and services at
agile speed without compromising application security.
IT companies must gain the 100% production run-time
visibility they need to defend against vulnerabilities in a containerized
environment. Its real-time, topology-driven, and precise risk assessment allows
IT teams to focus their energy where it matters for the business, eliminating
wasted time spent working through thousands of false positives.
Current advancements toward future IOT devices will
necessitate the collection and analysis of data from integrated devices such as
distributed storage, intelligent loads, and distributed energy resources. Big
data analytics can provide different types of insights when used with the IoT;
namely, descriptive analytics, diagnostic analytics, predictive analytics, and
prescriptive analytics. Descriptive analytics gives insights into how a
connected device is performing in real time. It can be used for anything from
locating a connected device to understanding how that device is used by
customers, to identifying anomalies.. Data visualization is an important aspect
of IoT analysis, aiding in the ability to identify key trends. Data
visualization is needed to properly identify and convey the best data insights
that can be used to drive business decisions. The data generated by IoT devices
is heterogeneous, meaning it comes in a variety of formats: structured,
unstructured, and semi-structured.
Threats evolve rapidly, and organizations that want to
escape game of catch-up use threat intelligence to enable proactive defenses.
Threat intelligence enables security teams to anticipate upcoming threats and
prioritize effectively to preempt them. Security teams can also use threat
intelligence to accelerate incident response and remediation and to make better
This Special Issue aims at publishing high-quality manuscripts
covering new research on topics related to the Integration of cloud computing
and Big data for better IOT utilization including but not limited to the
•DevOps Security and Vulnerabilities
•Version Control System and its benefits
•Dynatrace and Splunk monitoring in DevOps pipeline
•Cryptography and IAM.
•Security in microservices and containerization
•Virtualization, containerization, and
private, and hybrid clouds
Topics of interest include, but are not limited to:
security and vulnerabilities
•Intelligent prediction and recommendation for IoT decision-making.
big data analytics technology for IoT security.
confidentiality and privacy protection for IoT
•Lightweight IoT data transmission and communications
•Authentication and access control for data usage in IoT
Important dates on Special Issue:
for submissions: 30/10/2023
round of acceptance notification: 15/11/2023
•Submission of revised papers: 30/11/2023
•2nd round of acceptance notification:
•Publication online (tentative): 31/12/2023
Guest Editors of Special Issue
(Lead Guest Editor)
Prof. Vinay Singh, Sr Manager IT &
Software, Colorado, USA
(Other Guest Editors)
Prof. Shalini Aggarwal, Professor in Graphic Era University,
Mr. Gopi Krishna Dhamodharan, Manager IT
& Software, Colorado, USA