International Journal of Information Security and Privacy

短名
Journal Impact0.35
国际分区COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q4)
ISSN1930-1650, 1930-1669
h-index18

As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP) creates and fosters a forum where research in the theory and practice of information security and privacy is advanced. IJISP publishes high quality papers dealing with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy, through a balanced mix of theoretical and empirical research articles, case studies, book reviews, tutorials, and editorials. This journal encourages submission of manuscripts that present research frameworks, methods, methodologies, theory development and validation, case studies, simulation results and analysis, technological architectures, infrastructure issues in design, and implementation and maintenance of secure and privacy preserving initiatives.

涉及主题计算机科学计算机安全操作系统数学法学政治学计算机网络工程类人工智能程序设计语言万维网生物算法哲学互联网隐私经济物理
出版信息出版商: IGI Global Publishing出版周期: 期刊类型: journal
基本数据创刊年份: 2007原创研究文献占比98.68%自引率:0.00%Gold OA占比: 14.52%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

A Multi-Scale Temporal Feature Extraction Approach for Network Traffic Anomaly Detection

2024-9-14

Dynamic Adaptive Mechanism Design and Implementation in VSS for Large-Scale Unified Log Data Collection

2024-8-9

Enhancing Legal Protection of Children's Rights in the “Internet Plus”

2024-7-26

Improved Message Mechanism-Based Cross-Domain Security Control Model in Mobile Terminals

2024-7-23

Automated Ruleset Generation for “HTTPS Everywhere”

2024-7-17

Intelligent Video Monitoring and Analysis System for Power Grid Construction Site Safety Using Wireless Power Transfer

2024-7-17

Nudging Data Privacy of Mobile Health Applications in Saudi Arabia

2024-6-7

Network Information Security Monitoring Under Artificial Intelligence Environment

2024-6-6

An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training

2024-5-7

VCGERG

2024-5-2

RSA and Elliptic Curve Encryption System

2024-3-20

International Journal of Information Security and Privacy

2024-3-20

An Abnormal External Link Detection Algorithm Based on Multi-Modal Fusion

2024-2-7

Adaptive Personalized Randomized Response Method Based on Local Differential Privacy

2024-1-10

A Novel CNN-LSTM Fusion-Based Intrusion Detection Method for Industrial Internet

2023-7-7

A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors

2023-6-1

Trust and Voice Biometrics Authentication for Internet of Things

2023-4-26

“Every Dog Has His Day”

2023-3-10

A New Feature Selection Method Based on Dragonfly Algorithm for Android Malware Detection Using Machine Learning Techniques

2023-3-10

Super-Resolution Reconstruction of Remote Sensing Images Based on Symmetric Local Fusion Blocks

2023-3-9

Video Surveillance Camera Identity Recognition Method Fused With Multi-Dimensional Static and Dynamic Identification Features

2023-3-9

Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm

2023-3-3

i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security

2023-2-3

Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing

2023-2-3

Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in WSN

2023-1-6

Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures

2023-1-6

Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies

2022-12-30

Trajectory Data Publication Based on Differential Privacy

2022-12-16

CFS-MHA

2022-11-18

Credit Card Fraud Detection Based on Hyperparameters ‎Optimization Using the Differential Evolution

2022-11-17

Prediction of Phishing Websites Using AI Techniques

2022-11-11

Efficient ECC-Based CP-ABE Scheme With Constant-Sized Key and Scalable User Revocation

2022-10-14

Anomaly-Based Intrusion Detection Using Machine Learning

2022-10-14

Real-Time Cyber Analytics Data Collection Framework

2022-10-14

Deep Ensemble Model for Detecting Attacks in Industrial IoT

2022-10-14

A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices

2022-10-7

Balanced Scheduling Method of Network Information Resources for Cloud Storage

2022-10-7

ETP-AKEP Enhanced Three Party Authenticated Key Exchange Protocols for Data Integrity in Cloud Environments

2022-10-6

A Network Traffic Prediction Model Based on Graph Neural Network in Software-Defined Networking

2022-9-23

A Proposal Phishing Attack Detection System on Twitter

2022-9-22

Intelligent Recommendation Method of Mobile Wireless Communication Information Based on Speech Recognition Technology Under Strong Multipath Interference

2022-9-16

K-Means Cluster-Based Interference Alignment With Adam Optimizer in Convolutional Neural Networks

2022-9-16

Content-Based Collaborative Filtering With Predictive Error Reduction-Based CNN Using IPU Model

2022-9-16

Security in Data Sharing for Blockchain-Intersected IoT Using Novel Chaotic-RSA Encryption

2022-9-16

Interference Cancellation and Efficient Channel Allocation for Primary and Secondary Users Using Hybrid Cognitive (M2M) Mac Routing Protocol

2022-9-9

Prediction Method of Electric Energy Metering Device Based on Software-Defined Networking

2022-9-9

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司