Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJS CITATION IMPACT
3.248

Refer to In-Process Citation Report for IJS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS - Editorial Board Member (EBM)

Dr. Sepehr Amir-Mohammadian
University of the Pacific - United States of America
Contact Details
Email - samirmohammadian@pacific.edu
3601 Pacific Avenue, Stockton, CA 95211 USA
United States of America

About Dr. Sepehr Amir-Mohammadian

Dr. Amir-Mohammadian is an Assistant Professor at the Dept. of Computer Science, University of the Pacific. He received his PhD in Computer Science from University of Vermont, studying the enforcement of in-depth security using programming languages techniques. His research includes cybersecurity with focus on language-based techniques to provide formal software security assurance.

Dr. Amir-Mohammadian has been involved in the design and deployment of in-class and online cybersecurity programs at the University of the Pacific, and teaches courses on Computer Networking, Programming Languages, Cyber Defense and Offense, and Reliable Software Design among other courses.

Dr. Sepehr Amir-Mohammadian handles review of manuscripts that are submitted under the following topics.

  • Access control and audit
  • Formal security analyses
  • Information flow
  • Distributed access control
  • Authorization