International Journal of Information Security and Privacy
短名 | |
Journal Impact | 0.35 |
国际分区 | COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q4) |
ISSN | 1930-1650, 1930-1669 |
h-index | 18 |
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.
涉及主题 | 计算机科学计算机安全操作系统数学法学政治学计算机网络工程类人工智能程序设计语言万维网生物算法哲学互联网隐私经济物理 |
出版信息 | 出版商: IGI Global Publishing,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2007,原创研究文献占比: 98.68%,自引率:0.00%, Gold OA占比: 14.52% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection
2024-9-14
Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection
2024-8-9
Enhancing Legal Protection of Children's Rights in the “Internet Plus”
2024-7-26
Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals
2024-7-23
Automated Ruleset Generation for “HTTPS Everywhere”
2024-7-17
Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer
2024-7-17
Nudging Data Privacy of Mobile Health Applications in Saudi Arabia
2024-6-7
Network Information Security Monitoring Under Artificial Intelligence Environment
2024-6-6
An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training
2024-5-7
VCGERG
2024-5-2
RSA and Elliptic Curve Encryption System
2024-3-20
International Journal of Information Security and Privacy
2024-3-20
An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion
2024-2-7
Adaptive Personalized Randomized Response Method Based on Local Differential Privacy
2024-1-10
A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet
2023-7-7
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors
2023-6-1
Trust and Voice Biometrics Authentication for Internet of Things
2023-4-26
“Every Dog Has His Day”
2023-3-10
A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques
2023-3-10
Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks
2023-3-9
Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features
2023-3-9
Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm
2023-3-3
i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
2023-2-3
Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing
2023-2-3
Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN
2023-1-6
Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures
2023-1-6
Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies
2022-12-30
Trajectory Data Publication Based on Differential Privacy
2022-12-16
CFS-MHA
2022-11-18
Credit Card Fraud Detection Based on Hyperparameters Optimization Using the Differential Evolution
2022-11-17
Prediction of Phishing Websites Using AI Techniques
2022-11-11
Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation
2022-10-14
Anomaly-Based Intrusion Detection Using Machine Learning
2022-10-14
Real-Time Cyber Analytics Data Collection Framework
2022-10-14
Deep Ensemble Model for Detecting Attacks in Industrial IoT
2022-10-14
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices
2022-10-7
Balanced Scheduling Method of Network Information Resources for Cloud Storage
2022-10-7
ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments
2022-10-6
A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking
2022-9-23
A Proposal Phishing Attack Detection System on Twitter
2022-9-22
Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference
2022-9-16
K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks
2022-9-16
Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model
2022-9-16
Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption
2022-9-16
Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol
2022-9-9
Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking
2022-9-9
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远