Information Security Journal
Abbreviation | Inf. Secur. J.: Global Perspect. |
Journal Impact | 1.54 |
Quartiles(Global) | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3) |
ISSN | 1939-3547, 1939-3555 |
h-index | 32 |
The Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insights into current and existing professional development issues. We welcome submissions covering the following topics: Security Access Control Systems and Security Methodology, Security Telecommunications and Network Security, Business Continuity Planning and Disaster Recovery Planning, Security Management Practices, Security Architecture and Models, Law, Investigation, and Ethics in Information Security, Application and Systems Development Security, Cryptography Security, Computer Operations Security, and Physical Security. We are particularly keen to receive manuscripts that explore Cloud Security, Health Care Information Security and Privacy, and Cyber Forensics.
HomepagePublication Information | Publisher: Taylor and Francis Ltd.,Publishing cycle: ,Journal Type: journal,Open Access Journals: No |
Basic data | Year of publication: 2008,Proportion of original research papers: 93.10%,Self Citation Rate:6.20%, Gold OA Rate: 5.50% |
Journal Citation Format
Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.
Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.
A journal article with 1 author
A journal article with 2 authors
A journal article with 3 authors
A journal article with 5 or more authors
Books Citation Format
Here are examples of references for authored and edited books.
Thesis Citation Format
Web sites Citation Format
Sometimes references to web sites should appear directly in the text rather than in the bibliography.
Patent Citation Format
Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.
Click the button below to start a free trial!
Smart topology detection using multi-armed bandit reinforcement learning method
2024-12-10
Label flipping attacks in hierarchical federated learning for intrusion detection in IoT
2024-11-29
Designing a novel framework of email spam detection using an improved heuristic algorithm and dual-scale feature fusion-based adaptive convolution neural network
2024-12-2
SPGDAD: Slow HTTP-Get denial of service attack detection using ontology
2024-10-23
Digital risk: a systematic multivocal literature review
2024-11-4
Smart topology detection using multi-armed bandit reinforcement learning method
2024-12-10
Designing a novel framework of email spam detection using an improved heuristic algorithm and dual-scale feature fusion-based adaptive convolution neural network
2024-12-2
Label flipping attacks in hierarchical federated learning for intrusion detection in IoT
2024-11-29
Digital risk: a systematic multivocal literature review
2024-11-4
Hybrid secure routing and monitoring mechanisms in IoT-based wireless sensor networks using Egret-Harris optimization
2024-11-4