Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS) 
			
		
International Journal of Security (IJS)
				
				An International peer-review journal operated under CSC-OpenAccess Policy.
				
							
				
				ISSN - 1985-2320
				
				
				Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2025
				
				
				
				
				| 
 | |||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $50. See more details. | |||||
| 
 | 

|  | HOME |  | About IJS |  | Editorial Board |  | Call For Papers/Editors |  | Submission Guidelines |  | Citation Report |  | Issues Archive |  | Subscribe IJS | |||||||
| 
 | ||||||||||||||||||||||||||||||||
ABOUT IJS
Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.
IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
READERSHIP
IJS is a recognized International scientific journal that mainly targets computer security experts, researchers, academics, executives, administrators, policy makers, information security managers, security consultants and industrial community relevant to computer security in the field of access control and audit, security mechanisms, code security, confidentiality, privacy and information hiding and watermarking by publishing latest research articles in order to provide assistance and promote developments and innovations made in the field of computer and information security.LIST OF TOPICS

			
				Access control and audit
				
		  
	
		
			
				Anonymity
				
		  
	
		
			
				Anonymity and pseudonymity
				
		  
	
		
			
				Attacks, security mechanisms, and security service
				
		  
	
		
			
				Authentication
				
		  
	
		
			
				Authorisation
				
		  
	
		
			
				Biometrics
				
		  
	
		
			
				Cellular/wireless/mobile/satellite networks securi
				
		  
	
		
			
				Code security, including mobile code security
				
		  
	
		
			
				Computer forensics
				
		  
	
		
			
				Confidentiality, privacy, integrity, authenticatio
				
		  
	
		
			
				Cryptography and cryptanalysis
				
		  
	
		
			
				Data confidentiality issues
				
		  
	
		
			
				Data integrity issues
				
		  
	
		
			
				Data recovery
				
		  
	
		
			
				Database security
				
		  
	
		
			
				Denial of service
				
		  
	
		
			
				Denial of service attacks and countermeasures
				
		  
	
		
			
				Dependability and reliability
				
		  
	
		
			
				Design or analysis of security protocols
				
		  
	
		
			
				Distributed access control
				
		  
	
		
			
				Distributed and parallel systems security
				
		  
	
		
			
				Electronic commerce
				
		  
	
		
			
				Formal security analyses
				
		  
	
		
			
				Fraudulent usage
				
		  
	
		
			
				Information flow
				
		  
	
		
			
				Information hiding and watermarking
				
		  
	
		
			
				Intellectual property protection
				
		  
	
		
			
				Intrusion detection
				
		  
	
		
			
				Key management
				
		  
	
		
			
				Multicast security
				
		  
	
		
			
				Network and Internet security
				
		  
	
		
			
				Network forensics
				
		  
	
		
			
				Network security performance evaluation
				
		  
	
		
			
				Non-repudiation
				
		  
	
		
			
				Peer-to-peer security
				
		  
	
		
			
				Prevention of traffic analysis
				
		  
	
		
			
				Privacy protection
				
		  
	
		
			
				Public key cryptography and key management
				
		  
	
		
			
				Revocation of malicious parties
				
		  
	
		
			
				Risk assessment and management
				
		  
	
		
			
				Secure location determination
				
		  
	
		
			
				Secure PHY/MAC/routing protocols
				
		  
	
		
			
				Secure routing protocols
				
		  
	
		
			
				Security group communications
				
		  
	
		
			
				Security in ad hoc networks
				
		  
	
		
			
				Security in cellular networks (2G, 2.5G, 3G, B3G,
				
		  
	
		
			
				Security in communications
				
		  
	
		
			
				Security in content-delivery networks
				
		  
	
		
			
				Security in distributed systems
				
		  
	
		
			
				Security in domain name service
				
		  
	
		
			
				Security in e-mail
				
		  
	
		
			
				Security in high-speed networks
				
		  
	
		
			
				Security in integrated networks
				
		  
	
		
			
				Security in integrated wireless networks
				
		  
	
		
			
				Security in internet and WWW
				
		  
	
		
			
				Security in IP networks
				
		  
	
		
			
				Security in mobile IP
				
		  
	
		
			
				Security in optical systems and networks
				
		  
	
		
			
				Security in peer-to-peer networks
				
		  
	
		
			
				Security in satellite networks
				
		  
	
		
			
				Security in sensor networks
				
		  
	
		
			
				Security in VoIP
				
		  
	
		
			
				Security in wired and wireless integrated networks
				
		  
	
		
			
				Security in Wired Networks
				
		  
	
		
			
				Security in wireless communications
				
		  
	
		
			
				Security in wireless internet
				
		  
	
		
			
				Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
				
		  
	
		
			
				Security in wireless MANs (IEEE 802.16 and WiMAX)
				
		  
	
		
			
				Security in wireless PANs (Bluetooth and IEEE 802.
				
		  
	
		
			
				Security policies
				
		  
	
		
			
				Security specification techniques
				
		  
	
		
			
				Security standards
				
		  
	
		
			
				Tradeoff analysis between performance and security
				
		  
	
		
			
				Trust establishment
				
		  
	
		
			
				Viruses worms and other malicious code
				
		  
	
		
			
				WLAN and Bluetooth security
				
		  
	
		| ABSTRACTING & INDEXING | CITATION ANALYSIS | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| The publications of IJS are abstracted and indexed in following databases and websites. | 
 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||



 
 







