Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS

 

ABSTRACTING & INDEXING

   
Academic Index
Academic Journals Database
BibSonomy
Bielefeld Academic Search Engine (BASE)
CiteSeerX
Doc Player
Google Books
Google Scholar
iSEEK
J-Gate
PdfSR
refSeek
ResearchGate
ScientificCommons
Scribd
Semantic Scholar
SlideShare
Socol@r
TechRepublic
Refer to IJS Abstracting & Indexing for complete list of databases/websites.
 
 

ABOUT IJS

Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
 
CREATE AUTHOR ACCOUNT
 
Complete List of Journals >>
View all Special Issues >>
LAUNCH YOUR SPECIAL ISSUE
 
PUBLICATION VIDEOS
 
 

IJS PUBLICATIONS

 
Universities, institutes & research centers.
 
 
 
UNITED STATES OF AMERICA
University of Texas
Sam Houston State University
Dakota State University
UNITED KINGDOM
University of Portsmouth
Kingston University
AUSTRALIA
The University of Newcastle
MEXICO
Universidad Nacional Autónoma de México
PORTUGAL
University of Lisbon
MALAYSIA
Universiti Teknologi Malaysia
Multimedia University
CHINA
Chuzhou University
SAUDI ARABIA
Umm Al-Qura University
Prince Mohammad Bin Fahd University
JORDAN
Princess Sumaya University for Technology
TUNISIA
Electronics and Micro-Electronic Laboratory (LEME)
       

RANDOMLY SELECTED PUBLICATIONS

Classification of Malware Attacks Using Machine Learning In Decision Tree
  Abel Yeboah-Ofori
  School of Architecture, Computing & Engineering, University of East London, London, E16 2GA - United Kingdom
iBaTs: Interactive Bash Shell Adaptive Tutoring System
  Narasimha Karpoor Shashidhar, Cihan Varol, Keerthi Koneru
  Department of Computer Science, Sam Houston State University, Huntsville - United States of America
A Bring Your Own Device Risk Assessment Model
  Oonge S. Omboga, Muhambe, T. Mukisa , Ratemo, M. Cyprian
  School of Computing Department of Information Technology, Maseno University, Maseno, P.O. Box 333-40105 - Kenya
A Survey of Security and Forensic Features In Popular eDiscovery Software Suites
  Sundar Krishnan, Ashar Neyaz, Narasimha Shashidhar
  Sam Houston State University - United States of America
 

PEER REVIEW PROCESS

   
IJS Peer-Review Process
Helpful Hints for Getting Published
Publishing Ethics

IJS AWARDS

An annual acknowledgement to authors and reviewers for their outstanding contributions to IJS.

FIND MORE >>

SEE ALL VIDEOS >>

CITATION ANALYSIS

In-process citations of IJS that are extracted through Google Scholar.

Total Citations = 406

Self Citations = 0

Total Publications = 125

Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(406 - 0) / 125
= 3.248

 
In-Process Citation Report of IJS.
 

- Wide dissemination of publications
- International readership
- Qualitative Processes
- Pre / Post publication services
- Fast & timely publications

FIND MORE >>

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers
- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

IJS PARTNERSHIPS & COLLABORATIONS

 
 

EDITOR-IN-CHIEF (EiC)

 
 
Dr. Narasimha Shashidhar
Sam Houston State University - United States of America
Email - nks001@shsu.edu
 
 

RANDOMLY SELECTED EDITORS

 
 
Associate Professor Lei Chen
Georgia Southern University
United States of America
 
Dr. Cihan Varol
Sam Houston State University
United States of America
 
Associate Professor Jianguo Ding
University of Skovde
Sweden
VIEW IJS EDITORIAL BOARD
Join as Editor Reviewer or Author

SUBSCRIBE IJS