Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

ABOUT IJS

Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.

LIST OF TOPICS

Access control and audit
Anonymity
Anonymity and pseudonymity
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks securi
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authenticatio
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks (2G, 2.5G, 3G, B3G,
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Security in wireless MANs (IEEE 802.16 and WiMAX)
Security in wireless PANs (Bluetooth and IEEE 802.
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security

PEER REVIEW PROCESS

   
IJS Peer-Review Process
Helpful Hints for Getting Published
 

CITATION ANALYSIS

In-process citations of IJS that are extracted through Google Scholar.

Total Citations = 406
Self Citations = 0
Total Publications = 101


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(406 - 0) / 101 = 4.020

 
In-Process Citation Report for IJS
 

- Wide dissemination of publications

- International readership

- Qualitative Processes
(submission, review and publication)

- Pre / Post publication services

- Fast & timely publications

FIND MORE >>

 

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers

- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

RANDOMLY SELECTED EDITOR

 
 
Dr. Fengjun Li
University of Kansas
United States of America
 
 
Dr. Elena Irina Neaga
Loughborough University
United Kingdom
 
VIEW IJS EDITORIAL BOARD
Join as Editor Reviewer or Author
 

PARTNERSHIP & COLLABORATION

SUBSCRIBE IJS

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
CiteSeerX
refSeek
TechRepublic
iSEEK
Socol@r
ResearchGate
Bielefeld Academic Search Engine (BASE)
OpenJ-Gate
Scribd
SlideShare
PdfSR
Google Books
 
Refer to IJS Abstracting & Indexing for complete list of databases/websites.
 
 
RANDOMLY SELECTED PUBLICATIONS
Do Personality Profiles Differ in the Pakistani Software Industry and Academia A Study
  Arif Raza, Zaka-ul-Mustafa, Luiz Fernando Capretz - National University of Sciences & Technology (NUST) - Pakistan
  IJSE, Volume-3 : Issue-4 : 2012   |   Cites (3)   |   Full Text PDF
Criminal and Civil Identification with DNA Databases Using Bayesian Networks
  Marina Andrade, Manuel Alberto M. Ferreira - ISCTE- IUL - Portugal
  IJS, Volume-3 : Issue-4 : 2009   |   Cites (12)   |   Full Text PDF
Next-Generation Search Engines for Information Retrieval
  Ranjeet Devarakonda, Les Hook, Giri Palanisamy, Jim Green - Oak Ridge National Laboratory - United States of America
  IJSE, Volume-2 : Issue-1 : 2011   |   Cites (2)   |   Full Text PDF
Determination of Software Release Instant of Three-Tier Client Server Software System
  Yogesh Singh , Pradeep Kumar - ABES Engineering College , Ghaziabad - India
  IJSE, Volume-1 : Issue-3 : 2010   |   Cites (5)   |   Full Text PDF