Information assurance and security
Abbreviation | |
Journal Impact | 0.12 |
Quartiles(Global) | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 1554-1010, 1554-1029 |
Publication Information | Publisher: ,Publishing cycle: ,Journal Type: journal,Open Access Journals: No |
Basic data | Year of publication: ,Proportion of original research papers: 100.00%,Self Citation Rate:0.00%, Gold OA Rate: 0.00% |
Journal Citation Format
Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.
Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.
A journal article with 1 author
A journal article with 2 authors
A journal article with 3 authors
A journal article with 5 or more authors
Books Citation Format
Here are examples of references for authored and edited books.
Thesis Citation Format
Web sites Citation Format
Sometimes references to web sites should appear directly in the text rather than in the bibliography.
Patent Citation Format
Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.
Click the button below to start a free trial!
Unveiling Rare Patterns: Anomaly Detection in CCTV Footage for Safeguarding Home Premises
2024-8-1
State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks
2024-8-1
Survey of Recent Literature on Advanced Technologies in Digital Agriculture: Internet of Things and Blockchain
2024-8-1
Security Features on and with Documents: A Survey
2024-9-1
Z-K-R: A Novel Framework in Intrusion Detection system through enhanced techniques
2024-9-1
Security Features on and with Documents: A Survey
2024-9-1
Z-K-R: A Novel Framework in Intrusion Detection system through enhanced techniques
2024-9-1
Development of an Enhanced Human Face Recognition Model
2024-9-1
Unveiling Rare Patterns: Anomaly Detection in CCTV Footage for Safeguarding Home Premises
2024-8-1
State of the Art, Reliable, and Trusted Communication in Vehicle to Everything (V2X) Networks
2024-8-1