ACM Transactions on Privacy and Security
Abbreviation | ACM Trans. Priv. Secur. |
Journal Impact | 2.82 |
Quartiles(Global) | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2) |
ISSN | 2471-2566, 2471-2574 |
h-index | 26 |
ACM Transactions on Privacy and Security (TOPS), formerly known as TISSEC, publishes high-quality research findings in the fields of information and system security and privacy. We welcome research covering all aspects of these areas, from technology to systems and applications, as well as policy-making.
HomepageSubmission URLPublication Information | Publisher: Association for Computing Machinery (ACM),Publishing cycle: ,Journal Type: journal,Open Access Journals: No |
Basic data | Year of publication: 2016,Proportion of original research papers: 100.00%,Self Citation Rate:3.30%, Gold OA Rate: 0.00% |
Journal Citation Format
Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.
Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.
A journal article with 1 author
A journal article with 2 authors
A journal article with 3 authors
A journal article with 5 or more authors
Books Citation Format
Here are examples of references for authored and edited books.
Thesis Citation Format
Web sites Citation Format
Sometimes references to web sites should appear directly in the text rather than in the bibliography.
Patent Citation Format
Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.
Click the button below to start a free trial!
Deepfake Detection Model Combining Texture Differences and Frequency Domain Information
2024-12-3
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
2024-12-6
A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment
2024-11-30
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation
2024-11-23
Safe Driving Adversarial Trajectory Can Mislead: Towards More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module
2024-11-25
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage
2024-12-6
Deepfake Detection Model Combining Texture Differences and Frequency Domain Information
2024-12-3
A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment
2024-11-30
Safe Driving Adversarial Trajectory Can Mislead: Towards More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module
2024-11-25
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation
2024-11-23