Journal of Information Security and Applications
Abbreviation | J. Inf. Secur. Appl. |
Journal Impact | 3.96 |
Quartiles(Global) | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2) |
ISSN | 2214-2126, 2214-2134 |
h-index | 64 |
The Journal of Information Security and Applications (JISA) focuses on original research and practice-driven applications related to information security and its applications. JISA fosters a collaborative connection between the vibrant research community and industry professionals by providing clear insights into contemporary issues and challenges in information security, while identifying promising scientific and best practice solutions. The journal features a balance between original research work and innovative industrial approaches from internationally recognized experts and researchers in the field.
HomepageSubmission URLPublication Information | Publisher: Elsevier Ltd,Publishing cycle: ,Journal Type: journal,Open Access Journals: No |
Basic data | Year of publication: 2013,Proportion of original research papers: 99.11%,Self Citation Rate:7.90%, Gold OA Rate: 9.47% |
Journal Citation Format
Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.
Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.
A journal article with 1 author
A journal article with 2 authors
A journal article with 3 authors
A journal article with 5 or more authors
Books Citation Format
Here are examples of references for authored and edited books.
Thesis Citation Format
Web sites Citation Format
Sometimes references to web sites should appear directly in the text rather than in the bibliography.
Patent Citation Format
Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.
Click the button below to start a free trial!
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application
2024-4-29
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making
2024-7-26
Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment
2023-11
Adversarial watermark: A robust and reliable watermark against removal
2024-3-16
Social network behavior and public opinion manipulation
2021-12-8
Revisiting boomerang attacks on lightweight ARX and AND-RX ciphers with applications to KATAN, SIMON and CHAM
2024-12-16
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images
2024-12-11
A novel PVO-based RDH scheme utilizes an interleaved data embedding technique using dual-pixels
2024-12-10
Detection of identity swapping attacks in low-resolution image settings
2024-12-9
TPE-DNA: Approximate thumbnail preserving encryption based on difference expansion and DNA encoding
2024-12-9