International Journal of Information Security
短名 | Int. J. Inf. Secur. |
Journal Impact | 2.28 |
国际分区 | COMPUTER SCIENCE, THEORY & METHODS(Q2) |
期刊索引 | SCI Q2中科院 4 区 |
ISSN | 1615-5262, 1615-5270 |
h-index | 51 |
国内分区 | 计算机科学(4区)计算机科学计算机信息系统(4区)计算机科学计算机软件工程(4区)计算机科学计算机理论方法(4区) |
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 是一本关于信息安全研究的英文期刊,它提供重要的技术工作的及时出版,无论是理论性的、适用性的还是与实施相关的。覆盖范围包括系统安全:入侵检测、安全终端系统、安全操作系统、数据库安全、安全基础设施、安全评估;网络安全:互联网安全、防火墙、移动安全、安全代理、协议、防病毒和反黑客措施;内容保护:水印、软件保护、防篡改软件;应用:电子商务、政府、健康、电信、移动。
期刊主页投稿网址涉及主题 | 计算机科学计算机安全数学操作系统算法密码学计算机网络程序设计语言政治学法学工程类生物加密理论计算机科学人工智能万维网生态学地理历史哲学考古 |
出版信息 | 出版商: Springer Verlag,出版周期: Bimonthly,期刊类型: journal |
基本数据 | 创刊年份: 2005,原创研究文献占比: 96.15%,自引率:4.20%, Gold OA占比: 28.57% |
平均审稿周期 | 网友分享经验:平均12.0个月 |
平均录用比例 | 网友分享经验:约75% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
An overview of proposals towards the privacy-preserving publication of trajectory data
2024-9-4
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design
2024-9-3
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption
2024-9-3
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher
2024-8-29
Secure multi-party computation with legally-enforceable fairness
2024-8-29
Adversarial robustness of deep reinforcement learning-based intrusion detection
2024-8-29
Guiding the implementation of data privacy with microservices
2024-8-23
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security
2024-8-20
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech
2024-8-16
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
2024-8-14
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection
2024-8-13
A TCP-based covert channel with integrity check and retransmission
2024-8-12
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses
2024-8-4
Deep learning based network intrusion detection system: a systematic literature review and future scopes
2024-8-2
Privacy-preserving two-party computation of line segment intersection
2024-7-31
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions
2024-7-30
Press play, install malware: a study of rhythm game-based malware dropping
2024-7-29
Mitigation of privilege escalation attack using kernel data relocation mechanism
2024-7-25
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network
2024-7-23
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
2024-7-23
The $$\mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems
2024-7-20
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure
2024-7-19
A study on privacy and security aspects of personalised apps
2024-7-18
A few-shot learning based method for industrial internet intrusion detection
2024-7-18
Information flow control for comparative privacy analyses
2024-7-14
Trust attack prevention based on Spark-blockchain in social IoT: a survey
2024-7-13
Survey-based analysis of cybersecurity awareness of Turkish seafarers
2024-7-10
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
2024-7-8
Adaptive context-aware access control for IoT environments leveraging fog computing
2024-7-8
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
2024-7-8
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
2024-7-5
Expediting the design and development of secure cloud-based mobile apps
2024-7-4
Multi-party codebook distribution strategy based on secret sharing
2024-7-2
Gaming the system: tetromino-based covert channel and its impact on mobile security
2024-6-28
Acnn: arbitrary trace attacks based on leakage area detection
2024-6-26
A dynamic C-V2X anonymous authentication and group key agreement protocol
2024-6-18
Swarm-intelligence for the modern ICT ecosystems
2024-6-18
Email bombing attack detection and mitigation using machine learning
2024-6-13
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
2024-6-5
A compliance-based ranking of certificate authorities using probabilistic approaches
2024-5-29
IoT cybersecurity in 5G and beyond: a systematic literature review
2024-5-28
Model-Agnostic Utility-Preserving Biometric Information Anonymization
2024-5-23
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
2024-5-20
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology
2024-5-20
Decentralised identity federations using blockchain
2024-5-16
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
2024-5-14
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms
2024-5-13
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
2024-5-10
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
2024-5-9
Dynamic vulnerability severity calculator for industrial control systems
2024-5-8
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远