Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2021

SUBMISSION
August 31, 2021

NOTIFICATION
September 30, 2021

PUBLICATION
October 2021

 
         
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJS CITATION IMPACT
3.530

Refer to In-Process Citation Report for IJS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

Join IJS as Editor or Reviewer as the journal has open Call for Editors and Reviewers.

CALL FOR PAPERS

 

International Journal of Security (IJS)

ISSN - 1985-2320

https://www.cscjournals.org/journals/IJS/description.php

 

IMPORTANT DATES
Paper Submission - August 31, 2021
Author Notification - September 30, 2021
Issue Publication - October 2021

 

ABOUT IJS
Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.


EDITOR-IN-CHIEF
Dr. Narasimha Shashidhar - Sam Houston State University (United States of America)

EDITORIAL BOARD MEMBERS
- Associate Professor Jianguo Ding - University of Skovde (Sweden)
- Dr. Cihan Varol - Sam Houston State University (United States of America)
- Dr. Naga Spandana Muppaneni - Lafayette College (United States of America)
- Professor Xinyi Huang - Fujian Normal University (China)
- Associate Professor Lei Chen - Georgia Southern University (United States of America)
- Dr. Asaf Varol - Maltepe University (Turkey)
- Dr. Chadi El Kari - University of the Pacific (United States of America)
- Dr. Umit Karabiyik - Purdue University (United States of America)
- Dr. Xiwei Wang - Northeastern Illinois University (United States of America)
- Professor Weinan Gao - Florida Institute of Technology (United States of America)
- Dr. Sepehr Amir-Mohammadian - University of the Pacific (United States of America)

 

LIST OF TOPICS

Access control and audit
Anonymity
Anonymity and pseudonymity
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks securi
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authenticatio
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks (2G, 2.5G, 3G, B3G,
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Security in wireless MANs (IEEE 802.16 and WiMAX)
Security in wireless PANs (Bluetooth and IEEE 802.
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security



PAPER SUBMISSION DETAILS

In order to submit the paper, you need to register as author and then submit the paper through Author Dashboard. It is also important to ensure that the manuscript must be formatted as per IJS Manuscript Preparation Guidelines. For further information, please refer to the following information.

IJS Homepage - https://www.cscjournals.org/journals/IJS/description.php
IJS Publications - https://www.cscjournals.org/journals/IJS/issues-archive.php
Register as Author - https://www.cscjournals.org/login.php


USEFUL LINKS

Author Videos - https://www.cscjournals.org/authors/videos.php
Publication By Research Centers, Institutes and Universities - https://www.cscjournals.org/library/publicationplatforms.php

CSC-OpenAccess Library - https://www.cscjournals.org/library/oa-library.php


Please do not hesitate to contact us at cscpress@cscjournals.org if you require more information prior to submission. Our editors and support team are committed to provide quick response and support from initial submission to final publication with qualitative post-publication services.

Sincerely
Editorial Board Members
International Journal of Security (IJS)