Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2020

SUBMISSION
April 30, 2021

NOTIFICATION
May 31, 2021

PUBLICATION
June 30, 2021

HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS

CITATION ANALYSIS

IJS Citation Impact
(406 - 0) / 114 = 3.561

Refer to In-Process Citation Report for IJS for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Semantic Scholar
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

IJS - Editorial Board Member (EBM)

Dr. Xiwei Wang
Northeastern Illinois University - United States of America
Contact Details
Email - x-wang9@neiu.edu
5500 N St Louis Ave.
United States of America

About Dr. Xiwei Wang

Dr. Xiwei Wang is an Assistant Professor in the Computer Science Department at Northeastern Illinois University. He earned his Ph.D. in Computer Science from the University of Kentucky in May 2015, and his Master's degree in Computer Software and Theory from the University of Science and Technology of China in June 2009.

His research interests include data privacy and security, recommender systems, data mining, and machine learning. He served as reviewers for many international journals, such as IEEE Transactions on Information Forensics and Security, Computer Networks, Neurocomputing, Statistical Analysis and Data Mining, and Future Generation Computer Systems. He also served as technical committee members and session chairs for international conferences, such as MOBIMEDIA, INFOCOM, WCNC, and IEEE PAC.

Dr. Xiwei Wang handles review of manuscripts that are submitted under the following topics.

  • Electronic Commerce
  • Peer-to-peer Security
  • Privacy Protection
  • Security in Ad hoc Networks
  • Tradeoff Analysis between Performance and Security