Home   >   CSC-OpenAccess Library   >   Computer Security & Networks   >  International Journal of Security (IJS)
International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJS CITATION IMPACT
3.248

Refer to In-Process Citation Report for IJS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

CALL FOR PAPERS

  CREATE AUTHOR ACCOUNT

International Journal of Security (IJS)
ISSN - 1985-2320
https://www.cscjournals.org/journals/IJS/description.php

IMPORTANT DATES
Paper Submission - March 31, 2024
Author Notification - April 30, 2024
Issue Publication - May 31, 2024



• ISSUES ARCHIVE
https://www.cscjournals.org/journals/IJS/issues-archive.php

• FORTHCOMING ARTICLES
https://www.cscjournals.org/library/forthcoming-articles.php

• PUBLICATIONS BY COUNTRIES, UNIVERSITIES, INSTITUTES & RESEARCH CENTERS
https://www.cscjournals.org/library/publicationplatforms.php

• VIDEO PRESENTATIONS
Video presentations of editors and authors.

https://www.cscjournals.org/authors/videos.php

• OPEN ACCESS LIBRARY
Journals - Bio science, Applied Sciences, Biometrics, Math, Marketing, Computer & Network Security
.
https://www.cscjournals.org/library/byjournal.php

ABOUT IJS
Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.

The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.

IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.


EDITOR-IN-CHIEF
Dr. Narasimha Shashidhar - Sam Houston State University (United States of America)

EDITORIAL BOARD MEMBERS
- Associate Professor Jianguo Ding - University of Skovde (Sweden)
- Dr. Cihan Varol - Sam Houston State University (United States of America)
- Dr. Naga Spandana Muppaneni - Lafayette College (United States of America)
- Professor Xinyi Huang - Fujian Normal University (China)
- Associate Professor Lei Chen - Georgia Southern University (United States of America)
- Dr. Asaf Varol - Maltepe University (Turkey)
- Dr. Chadi El Kari - University of the Pacific (United States of America)
- Dr. Umit Karabiyik - Purdue University (United States of America)
- Dr. Xiwei Wang - Northeastern Illinois University (United States of America)
- Professor Weinan Gao - Florida Institute of Technology (United States of America)
- Dr. Sepehr Amir-Mohammadian - University of the Pacific (United States of America)

Join IJS Editorial Board >>

 

LIST OF TOPICS

Access control and audit
Anonymity
Anonymity and pseudonymity
Attacks, security mechanisms, and security service
Authentication
Authorisation
Biometrics
Cellular/wireless/mobile/satellite networks securi
Code security, including mobile code security
Computer forensics
Confidentiality, privacy, integrity, authenticatio
Cryptography and cryptanalysis
Data confidentiality issues
Data integrity issues
Data recovery
Database security
Denial of service
Denial of service attacks and countermeasures
Dependability and reliability
Design or analysis of security protocols
Distributed access control
Distributed and parallel systems security
Electronic commerce
Formal security analyses
Fraudulent usage
Information flow
Information hiding and watermarking
Intellectual property protection
Intrusion detection
Key management
Multicast security
Network and Internet security
Network forensics
Network security performance evaluation
Non-repudiation
Peer-to-peer security
Prevention of traffic analysis
Privacy protection
Public key cryptography and key management
Revocation of malicious parties
Risk assessment and management
Secure location determination
Secure PHY/MAC/routing protocols
Secure routing protocols
Security group communications
Security in ad hoc networks
Security in cellular networks (2G, 2.5G, 3G, B3G,
Security in communications
Security in content-delivery networks
Security in distributed systems
Security in domain name service
Security in e-mail
Security in high-speed networks
Security in integrated networks
Security in integrated wireless networks
Security in internet and WWW
Security in IP networks
Security in mobile IP
Security in optical systems and networks
Security in peer-to-peer networks
Security in satellite networks
Security in sensor networks
Security in VoIP
Security in wired and wireless integrated networks
Security in Wired Networks
Security in wireless communications
Security in wireless internet
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
Security in wireless MANs (IEEE 802.16 and WiMAX)
Security in wireless PANs (Bluetooth and IEEE 802.
Security policies
Security specification techniques
Security standards
Tradeoff analysis between performance and security
Trust establishment
Viruses worms and other malicious code
WLAN and Bluetooth security



PAPER SUBMISSION DETAILS

In order to submit the paper, you need to register as author and then submit the paper through Author Dashboard. It is also important to ensure that the manuscript must be formatted as per IJS Manuscript Preparation Guidelines. For further information, please refer to the following information.

IJS Submission Guidelines - https://www.cscjournals.org/journals/IJS/submission-guidelines.php

Register as Author - https://www.cscjournals.org/sm/au/step1.php

Register Your Special Issue - https://www.cscjournals.org/sm/si/step1.php


Please do not hesitate to contact us at cscpress@cscjournals.org if you require more information prior to submission. Our editors and support team are committed to provide quick response and support from initial submission to final publication with qualitative post-publication services.

Sincerely
Editorial Board Members
International Journal of Security (IJS)