Journal Finder

ACM Transactions on Privacy and Security

AbbreviationACM Trans. Priv. Secur.
Journal Impact2.82
Quartiles(Global)COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2)
ISSN2471-2566, 2471-2574
h-index26

ACM Transactions on Privacy and Security (TOPS), formerly known as TISSEC, publishes high-quality research findings in the fields of information and system security and privacy. We welcome research covering all aspects of these areas, from technology to systems and applications, as well as policy-making.

HomepageSubmission URL
Publication InformationPublisher: Association for Computing Machinery (ACM)Publishing cycle: Journal Type: journalOpen Access Journals: No
Basic dataYear of publication: 2016Proportion of original research papers100.00%Self Citation Rate:3.30%Gold OA Rate: 0.00%

Journal Citation Format

Those examples are references to articles in scholarly journals and how they are supposed to appear in your bibliography.

Not all journals organize their published articles in volumes and issues, so these fields are optional. Some electronic journals do not provide a page range, but instead list an article identifier. In a case like this it's safe to use the article identifier instead of the page range.

A journal article with 1 author

A journal article with 2 authors

A journal article with 3 authors

A journal article with 5 or more authors

Books Citation Format

Here are examples of references for authored and edited books.

Thesis Citation Format

Web sites Citation Format

Sometimes references to web sites should appear directly in the text rather than in the bibliography.

Patent Citation Format

Staying up late manually editing references? ivySCI automatically matches journals and helps you generate references with a single click.

Click the button below to start a free trial!

Download ivySCI

Share Submission Experience

Share my experience, help you go further

Reading Articles

Deepfake Detection Model Combining Texture Differences and Frequency Domain Information

2024-12-3

End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage

2024-12-6

A Trustworthy and Untraceable Centralised Payment Protocol for Mobile Payment

2024-11-30

Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation

2024-11-23

Safe Driving Adversarial Trajectory Can Mislead: Towards More Stealthy Adversarial Attack Against Autonomous Driving Prediction Module

2024-11-25

Latest Articles

Built withby Ivy Science