Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2019

SUBMISSION
October 31, 2019

NOTIFICATION
November 30, 2019

PUBLICATION
December 31, 2019

HOME   About IJS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 103 = 3.942

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academic Index
CiteSeerX
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS EDITORIAL BOARD MEMBER

Dr. Jianguo Ding
University of Skovde - Sweden
Contact Details
Email - Jianguo.Ding@ieee.org
University of Skövde School of Informatics Box 408, 54128 Skövde, Sweden
Sweden

ABOUT Dr. Jianguo Ding

Jianguo Ding currently is a senior lecturer at the school of informatics, University of Skövde, Sweden. Before he joined University of Skövde, he was a senior researcher at the Interdisciplinary Center for Security, Reliability and Trust (SnT), University of Luxembourg.

Jianguo Ding holds the degree of a Doktor-Ingenieur (Dr.-Ing.) (Doctorate in Engineering) from the Faculty of Mathematics and Computer Science of University of Hagen, Germany. He is a Senior Member of the IEEE and a Member of the ACM. His current research interests include distributed systems management and control, network security, wireless and mobile networks, network performance evaluation, intelligent technology, complex networks and probabilistic reasoning.

Dr. Jianguo Ding handles review of manuscripts that are submitted under the following topics.

  • Attacks, security mechanisms, and security service
  • Denial of service attacks and countermeasures
  • Intrusion detection
  • Network and Internet security
  • Network security performance evaluation
  • Security in content-delivery networks
  • Security in integrated networks
  • Viruses worms and other malicious code