Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
Godfried Williams (University of Gloucestershire and CEO of Intellas - United Kingdom)
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2017
Published by CSC Journals, Kuala Lumpur Malaysia.

CALL FOR PAPERS

International Journal of Security (IJS)

Volume-10, Issue-1
Paper Submission - May 31, 2017
Author Notification - June 30, 2017
Issue Publication - July 2017

LIST OF TOPICS

  • Access control and audit
  • Anonymity
  • Anonymity and pseudonymity
  • Attacks, security mechanisms, and security service
  • Authentication
  • Authorisation
  • Biometrics
  • Cellular/wireless/mobile/satellite networks securi
  • Code security, including mobile code security
  • Computer forensics
  • Confidentiality, privacy, integrity, authenticatio
  • Cryptography and cryptanalysis
  • Data confidentiality issues
  • Data integrity issues
  • Data recovery
  • Database security
  • Denial of service
  • Denial of service attacks and countermeasures
  • Dependability and reliability
  • Design or analysis of security protocols
  • Distributed access control
  • Distributed and parallel systems security
  • Electronic commerce
  • Formal security analyses
  • Fraudulent usage
  • Information flow
  • Information hiding and watermarking
  • Intellectual property protection
  • Intrusion detection
  • Key management
  • Multicast security
  • Network and Internet security
  • Network forensics
  • Network security performance evaluation
  • Non-repudiation
  • Peer-to-peer security
  • Prevention of traffic analysis
  • Privacy protection
  • Public key cryptography and key management
  • Revocation of malicious parties
  • Risk assessment and management
  • Secure location determination
  • Secure PHY/MAC/routing protocols
  • Secure routing protocols
  • Security group communications
  • Security in ad hoc networks
  • Security in cellular networks (2G, 2.5G, 3G, B3G,
  • Security in communications
  • Security in content-delivery networks
  • Security in distributed systems
  • Security in domain name service
  • Security in e-mail
  • Security in high-speed networks
  • Security in integrated networks
  • Security in integrated wireless networks
  • Security in internet and WWW
  • Security in IP networks
  • Security in mobile IP
  • Security in optical systems and networks
  • Security in peer-to-peer networks
  • Security in satellite networks
  • Security in sensor networks
  • Security in VoIP
  • Security in wired and wireless integrated networks
  • Security in Wired Networks
  • Security in wireless communications
  • Security in wireless internet
  • Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
  • Security in wireless MANs (IEEE 802.16 and WiMAX)
  • Security in wireless PANs (Bluetooth and IEEE 802.
  • Security policies
  • Security specification techniques
  • Security standards
  • Tradeoff analysis between performance and security
  • Trust establishment
  • Viruses worms and other malicious code
  • WLAN and Bluetooth security