Journal Finder

Journal of Information Security and Applications

AbbreviationJ. Inf. Secur. Appl.
Journal Impact3.96
Quartiles(Global)COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2)
ISSN2214-2126, 2214-2134
h-index64

The Journal of Information Security and Applications (JISA) focuses on original research and practice-driven applications related to information security and its applications. JISA fosters a collaborative connection between the vibrant research community and industry professionals by providing clear insights into contemporary issues and challenges in information security, while identifying promising scientific and best practice solutions. The journal features a balance between original research work and innovative industrial approaches from internationally recognized experts and researchers in the field.

HomepageSubmission URL
Publication InformationPublisher: Elsevier LtdPublishing cycle: Journal Type: journalOpen Access Journals: No
Basic dataYear of publication: 2013Proportion of original research papers99.11%Self Citation Rate:7.90%Gold OA Rate: 9.47%

Journal Citation Format

Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.

Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.

A journal article with 1 author

A journal article with 2 authors

A journal article with 3 authors

A journal article with 5 or more authors

Books Citation Format

Here are examples of references for authored and edited books.

Thesis Citation Format

Web sites Citation Format

Sometimes references to web sites should appear directly in the text rather than in the bibliography.

Patent Citation Format

Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.

Click the button below to start a free trial!

Download ivySCI

Share Submission Experience

Share my experience, help you go further

Reading Articles

A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application

2024-4-29

Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making

2024-7-26

Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment

2023-11

Adversarial watermark: A robust and reliable watermark against removal

2024-3-16

Social network behavior and public opinion manipulation

2021-12-8

Latest Articles

Built withby Ivy Science