An official website of the United States government
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

The Cyber Defense Review

Instructions to Authors

About the Cyber Defense Review

 

The Cyber Defense Review (CDR) is an open-access, peer-reviewed, scholarly journal that serves as a forum for current and emerging research on cyber operations. Its focus is on strategy, operations, tactics, history, ethics, law, and policy in the cyber domain. CDR positions itself as a leading venue for interdisciplinary work at the intersection of cyber and defense, welcoming contributions from the military, industry, professional, and academic communities.

 

The journal is committed to publishing original, previously unpublished, and intellectually rigorous research that advances the body of knowledge in this rapidly evolving field. We invite timely and relevant submissions that reflect both theoretical insight and practical application, with the goal of informing cyber-related decision-making, operations, and scholarship. As cyberspace is global, the CDR welcomes and encourages international participation. All submissions must contain unclassified material that is suitable for unrestricted distribution.

 

The Cyber Defense Review is published quarterly by West Point Press. To learn more about West Point Press and its publications, please visit https://westpointpress.com/

 

Scope of the journal

 

Research areas considered by the journal include (but are not limited to):

  • · Cyber strategy, doctrine, and military operations
  • · Cyber conflict, deterrence, and escalation dynamics
  • · Offensive and defensive cyber capabilities
  • · Cybersecurity policy and governance
  • · Cyber law and legal frameworks for conflict and attribution
  • · Ethics of cyber operations and autonomous systems
  • · Cyber threat analysis and adversary behavior
  • · Critical infrastructure protection and resilience
  • · Emerging technologies in the cyber domain (e.g., AI, quantum computing)
  • · Human factors and decision-making in cyber operations
  • · Joint, multi-domain operations, and civil-military operations involving cyber components
  • · Modeling and simulation of cyber operations
  • · AI-enabled cyber operations
  • · Cyber force structure, generation, training, and education
  • · Historical case studies of cyber conflict or information operations
  • · Strategic influence, disinformation, and psychological operations
  • · Lessons learned from exercises, simulations, and wargaming

 

Contribution types

The Cyber Defense Review publishes a range of contribution types to reflect the multidisciplinary nature of the cyber defense field. We welcome Research Articles, which present original theoretical, empirical, or conceptual work that advances scholarly understanding of cyber operations, policy, or strategy. We also accept Professional Commentaries, which offer timely, practice-informed insights or critical reflections on emerging issues. Finally, our Senior Leader Perspective section features curated contributions from experienced leaders in government, military, or industry, offering strategic viewpoints that enrich the journal’s relevance to both scholars and practitioners.

Authors should ensure that their articles can be read at both interdisciplinary and disciplinary levels. All submissions must contain unclassified material that is suitable for unrestricted distribution.

While word count ranges are provided for each article type, they are not enforced rigidly. Authors should prioritize clarity, conciseness, and relevance. If your manuscript falls significantly outside the suggested range, feel free to contact the editorial team for guidance.

 

Research Articles (long and short)

Research Articles are peer-reviewed contributions that present original and rigorous scholarship relevant to the cyber defense landscape. Given the multidisciplinary nature of the journal and its broad readership—including practitioners, academics, policymakers, and military professionals—we welcome a wide range of research approaches and submissions, from shorter analytical pieces to longer, in-depth studies.

 

Submissions may include empirical research, theoretical or methodological contributions, literature reviews, or critical analyses of strategic, legal, operational, or ethical dimensions of cyber defense. Some research articles may take the form of shorter, focused explorations of early findings or novel ideas, while others may offer comprehensive investigations or position papers. Regardless of length or approach, all articles should be clearly written, well-grounded in the relevant body of knowledge, and accessible to readers outside highly specialized technical domains.

 

Typical length ranges from 3,000 to 10,000 words (excluding abstract and references), with shorter pieces expected to have a tightly scoped contribution and longer ones offering more substantial or integrative insights.

Submissions to the Research Articles track follow a double-blinded peer-review process and should thus be anonymized.

 

Professional Commentaries

Professional Commentaries provide timely, practice-oriented reflections on current developments, operational challenges, or policy issues in the cyber defense landscape. These contributions are designed to stimulate informed discussion and share wisdom and knowledge across sectors. While we do not expect a high level of academic formalism, the strongest commentaries are those that thoughtfully engage with relevant literature, frameworks, or prior debates to support and enrich the author’s argument or experience. They are typically 1,500 to 4,000 words and written in an accessible tone. Submissions to the Professional Commentary track follow a single-blind review process, where the reviewers know the identity of the authors.

 

Senior Leader Perspectives

Senior Leader Perspectives are curated pieces authored by senior figures in the military, government, or industry. These articles offer high-level reflections, strategic viewpoints, or vision pieces that speak to long-term challenges and opportunities in cyber defense. While they are not peer-reviewed, they are selected and edited by the editorial team for relevance, clarity, and impact. Lengths may vary, but are generally between 1,500 and 4,000 words.

 

Originality

By submitting a manuscript to The Cyber Defense Review, authors confirm that the work is original and has not been previously published in any form, except as part of a dissertation, an abstract, or a recorded lecture.

Manuscripts must not be under review elsewhere, including other journals, conferences, or workshop proceedings. All authors must approve the submission, along with any relevant institutional or funding authorities. The journal does not tolerate plagiarism, including self-plagiarism or duplicate publication without proper citation. All submissions will be subject to originality checks using plagiarism detection software.

 

Public-Facing Publications

Authors may publish non-peer-reviewed, public-facing pieces (e.g., policy briefs, blog posts, or op-eds) that draw on ideas from their submitted or accepted article, provided the content is written for a different audience, does not substantially reproduce the submitted text, and ideally references the forthcoming publication in The Cyber Defense Review (only once the article has been formally accepted by the CDR). Such publications must be disclosed to the editorial team at the time of submission or as soon as they are planned.

 

Open Access Policy

The Cyber Defense Review follows a platinum Open-access model. We are committed to equitable access and wide dissemination of research that contributes to cyber defense scholarship and practice.

All articles are freely accessible to readers worldwide without subscription fees or paywalls, and immediately after publication. No article processing charges (APCs) are required from authors. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.

 

The CDR does not profit from, nor compensate authors for its submissions. In accordance with the U.S. Joint Ethics Regulation, the CDR does not screen submissions to fit a particular editorial agenda. Further, publication by the CDR does not constitute endorsement of the materials or any organizations. Submission of an article to the CDR does not create a contractual relationship between the author(s) and the CDR, and does not transfer any rights to or from the author(s) or the CDR.

 

Policies and Responsibilities for Authors

 

Security Review and Clearance

CDR is the only unclassified Department of Defense sponsored journal that exclusively covers the cyber domain.

The CDR functions under the DoD Public Affairs principle of "security review at the source." All submissions must contain unclassified material that is suitable for unrestricted distribution. To ensure no violation of security or policy clearance strictures, it is the author's responsibility to ensure that their submission receives any applicable security review prior to submission. For U.S. Government authors, submissions that is/are characterized as opinion or historical pieces does/do not require security review; all other categories of submissions must include proof of security review signed by the security officer and public affairs officer of the author's assigned organization.

 

Additionally, all U.S. Government authors shall include the following disclaimer in the Work(s): "DISCLAIMER: The views expressed in this work are those of the author(s) and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, or the Department of Defense."

 

Authorship criteria

All individuals listed as authors on a manuscript submitted to The Cyber Defense Review must meet the following authorship criteria. Authors must have made a substantial contribution to at least one of the following: the conception or design of the work; the acquisition, analysis, or interpretation of data; the drafting of the manuscript; or its critical revision for important intellectual content.

In addition to contributing intellectually, all authors must have approved the final version of the manuscript and must agree to be accountable for all aspects of the published work, including the accuracy and integrity of any part of the content.

Individuals who do not meet these criteria—such as those who provided general supervision, administrative support, or editorial assistance—should not be listed as authors but may be acknowledged elsewhere in the manuscript. Authorship must reflect actual contributions, and honorary or guest authorship is not acceptable.

 

Copyright and use of third-party material

The author is responsible for securing permission for any copyrighted material included in the submission. The author must ensure the content of the submission does not contain material that is libelous, or would violate copyright or otherwise infringe upon the rights of others, including patent, trademark, trade secret, or rights of privacy or publicity. Prior to publication of the article, the author shall provide the CDR with proof of consent to use all copyright-protected material.

 

Ethical approval

All research involving human participants, human data, or human-derived materials must adhere to recognized ethical standards, including the principles outlined in the Declaration of Helsinki. Such research must receive approval from an appropriate ethics review board, and the manuscript must include a statement specifying the name of the ethics committee and, when applicable, the approval or reference number. If the research received

an exemption from ethics approval, this must also be clearly stated in the manuscript. Authors should be prepared to provide additional documentation upon request. The editorial team reserves the right to reject submissions if it determines that the study was not conducted within an acceptable ethical framework.

 

Responsible Use of Large Language Models and Generative AI Tools

We allow, and even encourage, authors to use Large Language Models (LLMs) and generative AI tools (e.g., ChatGPT, Gemini) to assist with writing, editing, or translation. This can be done under three key conditions. First, all content produced must be correct, original, and accurately reflect the author’s own intellectual contributions. Authors remain fully responsible for AI outputs as well as the appropriateness of the research process for which AI is used. Second, authors must clearly disclose any use of AI software when it generates substantive new text, code, tables, or figures. Such disclosures, detailing the tool used and sections affected (prompt text disclosure is left at the discretion of the authors), should be included in acknowledgements or appendices, with the level of detail matching the extent of AI use. Third, AI tools must never be listed as co‑authors; all listed authors must meet standard authorship criteria and are fully accountable for the content.

 

Authors may use AI tools to enhance grammar, clarity, or spelling, without needing disclosure. However, any use beyond basic language polishing must be transparently reported. These guidelines ensure responsible use of AI while maintaining full author ownership and accountability for published work.

 

This section will be updated with new information as the landscape evolves

 

Publication Ethics and Malpractice

The Cyber Defense Review is committed to upholding the highest standards of publication ethics and integrity. We follow the principles and guidelines established by the Committee on Publication Ethics (COPE). This includes expectations for editors, authors, and reviewers regarding originality, fairness, transparency, and confidentiality throughout the submission and review process.

All parties involved in the publication process are expected to act responsibly and ethically. Authors affirm that their work is original, properly cited, and not under consideration elsewhere. Reviewers must provide fair, timely, and unbiased assessments, and editors are responsible for ensuring a transparent and rigorous review process.

For detailed guidance on ethical responsibilities, please refer to the COPE website: https://publicationethics.org

Peer-review process

All submissions to The Cyber Defense Review are first screened by the Editor-in-Chief. Manuscripts that fall outside the journal’s scope or do not meet the expected standard of scholarly quality may be desk-rejected without external review. This initial decision is typically made within three weeks of submission. Manuscripts that pass this stage are assigned to a member of the Editorial Board, who serves as Associate Editor and oversees the review process.

Most manuscript types are then submitted to external peer review, usually by three independent reviewers, as part of a double-anonymized process (where both reviewers and authors remain anonymous to one another). Reviewers are selected based on subject-matter expertise and are asked to evaluate the originality, rigor, clarity, and relevance of the manuscript for the journal’s audience.

Submissions to the Professional Commentary track follow a single-blind review process, where the reviewers know the identity of the authors. This is due to the nature of professional commentaries, which often rely on identifiable case studies, organizational affiliations, or real-world operational insights that cannot be fully anonymized without compromising the value and context of the contribution. These commentaries are juried for clarity, insight, and relevance by members of the editorial team and selected reviewers.

Authors may suggest potential reviewers who are well-qualified to assess the submission. However, suggested reviewers must not have any conflict of interest, defined as a personal, professional, or institutional relationship that could bias the review process. The editorial team retains full discretion over reviewer selection. Both peer reviewers and editors are expected to treat all submitted materials as confidential and must not share, discuss, or use any part of the content for purposes outside the review process.

Based on the reviewers’ feedback and the judgment of the Associate Editor and Editor-in-Chief, a decision is made to:

  • Reject the submission,
  •  Invite a revision (minor or major), or
  •  Accept the manuscript (usually pending minor corrections).

Acceptance on the first round of review is rare. In most cases, even promising manuscripts require revision—whether to clarify arguments, respond to reviewer concerns, strengthen evidence, or refine structure and style. If a revision is invited, authors will receive a meta-review summarizing the reviewers’ comments and offering clear guidance for improvement. Revised manuscripts are expected within 20 to 30 days, depending on the nature and scope of the changes requested; the editorial office will consider extension requests on a case-by-case basis. All resubmissions must be accompanied by a clear, point-by-point response to reviewers, explaining how each comment has been addressed. Revised manuscripts are usually evaluated by the same reviewers. An invitation to revise does not guarantee eventual acceptance; manuscripts may still be declined at any stage if concerns remain unresolved.

In some cases, when a submission does not align with our editorial direction or space limitations, but still holds clear value for the community, we may encourage or assist authors in submitting their work to one of our partner publications, such as the Modern War Institute (MWI) or Gray Space, which offer alternative formats and similar high-quality content.

The Editor-in-Chief communicates all editorial decisions directly to authors. A first decision is generally expected within three to five months of submission, with further review rounds as needed.

 

Publication process

Once an article has been accepted for publication in The Cyber Defense Review, it enters a structured post-acceptance process. First, the manuscript undergoes professional copy editing to ensure clarity, accuracy, and alignment with the journal’s editorial style. The edited version is then returned to the authors for validation. At this stage, authors are also asked to sign the journal’s open access agreement.

Following approval, the article is typeset and formatted for publication. Final proofs are sent to the authors for one last check before release. A DOI (Digital Object Identifier) is assigned to the article, providing a permanent, citable link and allowing authors to share their work as early as possible..

The final version is then published on our website in the Advance Online Publication section, allowing early access ahead of print. Once a full issue is compiled, the article is included in the print edition of the journal and distributed accordingly. The corresponding author receives one complimentary print copy of the issue in which their article appears.

 

Preparing your Manuscript

 

Manuscript submission

Manuscripts must be submitted in Microsoft Word (.docx) format or as a LaTeX document (with all source files and compiled PDF). All manuscripts should be submitted through the journal’s online submission system: https://www.editorialmanager.com/cyberdefreview/default.aspx

 

  •  Submissions should be in English and written in a clear, concise, and scholarly tone. Use American English spelling and conventions throughout. Avoid jargon when possible and define acronyms upon first use.
  •  Include page numbers and line numbers for easier reference during peer review.
  •  A title page should be included, listing the full title, author(s) names, institutional affiliations, and contact details for the corresponding author.
  •  Please include at submission all supplementary material cited in the text.
Anonymization for peer review

For peer-reviewed submission types (Research Articles), please remove author names and any self-identifying references from the manuscript files to enable double-anonymized review. This includes tables and figures, supplemental materials, or external links to datasets, code repositories, etc.

Regarding anonymization of prior work by the authors, we generally recommend referring to your own publications in the third person whenever possible, for example, “Doe et al. (2025) argue that…” instead of “In our previous study, we argued…”.

A separate title page with author information and acknowledgements should be uploaded in the journal’s online submission system.

 

ORCID

Submitting authors are required to provide an ORCID iD (Open Researcher and Contributor ID) at submission. ORCID identifiers are included in papers and displayed online, both in the HTML and PDF versions of the publication, in compliance with recommended practice issued by ORCID.

If you do not already have an ORCID iD, you can register for free via the ORCID website.

 

Basic formatting guide

Abstract and keywords. Provide a short abstract (around 150-200 words max.), avoiding any abbreviations and reference citations. Provide five keywords that reflect the core themes of your manuscript.

Citation style. The CDR uses a Chicago Author-Date citation style (https://www.chicagomanualofstyle.org/home)

In-text citations should include the author's last name and year of publication (e.g., Smith 2023).

The reference list should appear at the end of the manuscript, ordered alphabetically by author last name.

Include full publication details for each source, including DOIs where available.

 

Figures and Tables. Figures and tables should be clearly labeled and embedded within the main text near their first mention. Include descriptive captions and cite all figures/tables in the body of the manuscript. Ensure all visuals are high-resolution (minimum 300 dpi) and suitable for grayscale printing. Please submit any tables in your main article document in an editable format (Word or TeX/LaTeX, as appropriate), and not as images.

 

Accessibility and print-ready requirements. Authors are encouraged to follow accessibility best practices when preparing visual materials:

  •  Provide alt text for all figures and tables to describe their content for screen readers.
  •  Use symbols, patterns, or labels in graphs and charts instead of color alone, as all papers are printed in grayscale. Color should not be used to convey meaning, since it will not appear in the print version.
  •  Use clear, legible fonts and ensure high contrast between text and background in all visuals.

These practices help ensure your work is accessible to all readers, including those using assistive technologies.

 

Author Biographies and Photos. Each submission must include a brief author biography (maximum 150 words) for every listed author, highlighting relevant affiliations, expertise, or experience related to the article. Please also provide a high-resolution author photo (headshot) to accompany the bio for publication.

 

Supplementary Material

Authors may include appendices, data tables, or supporting documents if they are essential to the work. These will be reviewed alongside the manuscript. Supporting materials which are not essential for inclusion in the full text may be published as online-only Supplementary Data.

Supplementary Data should be submitted for review, in a separate file or files from the manuscript. Most common file formats may be used: .doc; .ppt. .xls; .tif; jpg. Video files may be supplied in MP4, AVI or WMV format. Authors should ensure that the Supplementary Data is referred to in the main manuscript at an appropriate point in the text. It cannot be altered or replaced after the paper has been accepted for publication.

 

Data availability statement

The inclusion of a data availability statement is a requirement for papers published in CDR. Data availability statements provide a standardized format for readers to understand the availability of original and third-party data underlying the research results described in the paper. The statement should describe and provide means of access, where possible, by linking to the data or providing the required unique identifier.

 

Submitting a revised manuscript

If resubmitting, provide a clean version of the revised manuscript, plus the original version, marked up with the revisions you have made. In addition, submit a document explaining how you have addressed each of the comments made by the reviewers and the Associate Editor.

 

Formatting guide – manuscripts at final submission

Funding information or Acknowledgements - If you have Funding information or Acknowledgements, please insert these paragraphs into the main manuscript at this stage.

Once a manuscript is accepted for publication, authors will be asked to provide:

  • A LinkedIn profile URL for each author (for promotional purposes)
  •  A brief, tweet-style summary (under 250 characters) written in layman's terms to help promote the article on social media

For any questions, please contact the CDR Editorial Team at TheCyberDefenseReview@westpoint.edu