Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 101 = 4.020

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
CiteSeerX
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

CALL FOR PAPERS

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019


International Journal of Security (IJS) invites original research papers, review articles, case studies and short communications that are not published or not being considered for publication.


LIST OF TOPICS

Access control and audit
Anonymity
Anonymity and pseudonymity
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks securi
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authenticatio
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks (2G, 2.5G, 3G, B3G,
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Security in wireless MANs (IEEE 802.16 and WiMAX)
Security in wireless PANs (Bluetooth and IEEE 802.
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security

CALL FOR EDITORS & REVIEWERS

Join the network of 18000+ researchers who participates in review and publications with CSC Journals.

   
EDITORS GUIDELINES - Find more about roles, responsibilities, benefits and privileges under Editors Guidelines that IJS editors get with collaboration with CSC Journals. Join As IJS Editor.
 
 
SPECIAL ISSUE GUIDELINES - Launch IJS Special Issue to promote your research efforts and yourself among International research community.
 
 
REVIEWERS GUIDELINES - Find about CSC peer-review process and reviewers benefits under Reviewers Guidelines. Join As IJS Reviewer.