Home > CSC-OpenAccess Library > Computer Security & Networks > International Journal of Security (IJS)

International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2020
|
|||

![]() |
HOME | ![]() |
About IJS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJS | |||||||
|
CALL FOR PAPERS
SUBMISSION |
NOTIFICATION |
PUBLICATION |
International Journal of Security (IJS) invites original research papers, review articles, case studies and short communications that are not published or not being considered for publication.
LIST OF TOPICS

Access control and audit

Anonymity

Anonymity and pseudonymity

Attacks, security mechanisms, and security service

Authentication

Authorisation

Biometrics

Cellular/wireless/mobile/satellite networks securi

Code security, including mobile code security

Computer forensics

Confidentiality, privacy, integrity, authenticatio

Cryptography and cryptanalysis

Data confidentiality issues

Data integrity issues

Data recovery

Database security

Denial of service

Denial of service attacks and countermeasures

Dependability and reliability

Design or analysis of security protocols

Distributed access control

Distributed and parallel systems security

Electronic commerce

Formal security analyses

Fraudulent usage

Information flow

Information hiding and watermarking

Intellectual property protection

Intrusion detection

Key management

Multicast security

Network and Internet security

Network forensics

Network security performance evaluation

Non-repudiation

Peer-to-peer security

Prevention of traffic analysis

Privacy protection

Public key cryptography and key management

Revocation of malicious parties

Risk assessment and management

Secure location determination

Secure PHY/MAC/routing protocols

Secure routing protocols

Security group communications

Security in ad hoc networks

Security in cellular networks (2G, 2.5G, 3G, B3G,

Security in communications

Security in content-delivery networks

Security in distributed systems

Security in domain name service

Security in e-mail

Security in high-speed networks

Security in integrated networks

Security in integrated wireless networks

Security in internet and WWW

Security in IP networks

Security in mobile IP

Security in optical systems and networks

Security in peer-to-peer networks

Security in satellite networks

Security in sensor networks

Security in VoIP

Security in wired and wireless integrated networks

Security in Wired Networks

Security in wireless communications

Security in wireless internet

Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

Security in wireless MANs (IEEE 802.16 and WiMAX)

Security in wireless PANs (Bluetooth and IEEE 802.

Security policies

Security specification techniques

Security standards

Tradeoff analysis between performance and security

Trust establishment

Viruses worms and other malicious code

WLAN and Bluetooth security
CALL FOR EDITORS & REVIEWERS
Join the network of 18000+ researchers who participates in review and publications with CSC Journals.
![]() |
EDITORS GUIDELINES - Find more about roles, responsibilities, benefits and privileges under Editors Guidelines that IJS editors get with collaboration with CSC Journals. Join As IJS Editor. |
![]() |
SPECIAL ISSUE GUIDELINES - Launch IJS Special Issue to promote your research efforts and yourself among International research community. |
![]() |
REVIEWERS GUIDELINES - Find about CSC peer-review process and reviewers benefits under Reviewers Guidelines. Join As IJS Reviewer. |