International Journal of Information Security

短名Int. J. Inf. Secur.
Journal Impact2.28
国际分区COMPUTER SCIENCE, THEORY & METHODS(Q2)
期刊索引SCI Q2中科院 4 区
ISSN1615-5262, 1615-5270
h-index51
国内分区计算机科学(4区)计算机科学计算机信息系统(4区)计算机科学计算机软件工程(4区)计算机科学计算机理论方法(4区)

INTERNATIONAL JOURNAL OF INFORMATION SECURITY 是一本关于信息安全研究的英文期刊,它提供重要的技术工作的及时出版,无论是理论性的、适用性的还是与实施相关的。覆盖范围包括系统安全:入侵检测、安全终端系统、安全操作系统、数据库安全、安全基础设施、安全评估;网络安全:互联网安全、防火墙、移动安全、安全代理、协议、防病毒和反黑客措施;内容保护:水印、软件保护、防篡改软件;应用:电子商务、政府、健康、电信、移动。

期刊主页投稿网址
涉及主题计算机科学计算机安全数学操作系统算法密码学计算机网络程序设计语言政治学法学工程类生物加密理论计算机科学人工智能万维网生态学地理历史哲学考古
出版信息出版商: Springer Verlag出版周期: Bimonthly期刊类型: journal
基本数据创刊年份: 2005原创研究文献占比96.15%自引率:4.20%Gold OA占比: 28.57%
平均审稿周期 网友分享经验:平均12.0个月
平均录用比例网友分享经验:约75%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

An overview of proposals towards the privacy-preserving publication of trajectory data

2024-9-4

Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design

2024-9-3

An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption

2024-9-3

Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher

2024-8-29

Secure multi-party computation with legally-enforceable fairness

2024-8-29

Adversarial robustness of deep reinforcement learning-based intrusion detection

2024-8-29

Guiding the implementation of data privacy with microservices

2024-8-23

Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security

2024-8-20

Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech

2024-8-16

A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

2024-8-14

Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection

2024-8-13

A TCP-based covert channel with integrity check and retransmission

2024-8-12

Unmasking SDN flow table saturation: fingerprinting, attacks and defenses

2024-8-4

Deep learning based network intrusion detection system: a systematic literature review and future scopes

2024-8-2

Privacy-preserving two-party computation of line segment intersection

2024-7-31

Early mitigation of CPU-optimized ransomware using monitoring encryption instructions

2024-7-30

Press play, install malware: a study of rhythm game-based malware dropping

2024-7-29

Mitigation of privilege escalation attack using kernel data relocation mechanism

2024-7-25

Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network

2024-7-23

A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead

2024-7-23

The $$\mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems

2024-7-20

The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure

2024-7-19

A study on privacy and security aspects of personalised apps

2024-7-18

A few-shot learning based method for industrial internet intrusion detection

2024-7-18

Information flow control for comparative privacy analyses

2024-7-14

Trust attack prevention based on Spark-blockchain in social IoT: a survey

2024-7-13

Survey-based analysis of cybersecurity awareness of Turkish seafarers

2024-7-10

Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

2024-7-8

Adaptive context-aware access control for IoT environments leveraging fog computing

2024-7-8

Using the ACE framework to enforce access and usage control with notifications of revoked access rights

2024-7-8

Trust management in the internet of vehicles: a systematic literature review of blockchain integration

2024-7-5

Expediting the design and development of secure cloud-based mobile apps

2024-7-4

Multi-party codebook distribution strategy based on secret sharing

2024-7-2

Gaming the system: tetromino-based covert channel and its impact on mobile security

2024-6-28

Acnn: arbitrary trace attacks based on leakage area detection

2024-6-26

A dynamic C-V2X anonymous authentication and group key agreement protocol

2024-6-18

Swarm-intelligence for the modern ICT ecosystems

2024-6-18

Email bombing attack detection and mitigation using machine learning

2024-6-13

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

2024-6-5

A compliance-based ranking of certificate authorities using probabilistic approaches

2024-5-29

IoT cybersecurity in 5G and beyond: a systematic literature review

2024-5-28

Model-Agnostic Utility-Preserving Biometric Information Anonymization

2024-5-23

Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability

2024-5-20

BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology

2024-5-20

Decentralised identity federations using blockchain

2024-5-16

Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation

2024-5-14

Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms

2024-5-13

Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

2024-5-10

IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications

2024-5-9

Dynamic vulnerability severity calculator for industrial control systems

2024-5-8

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司