Home > CSC-OpenAccess Library > Computer Security & Networks > International Journal of Security (IJS)

International Journal of Security (IJS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-2320
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
|

![]() |
HOME | ![]() |
About IJS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJS | |||||||
|
ABOUT IJS
Information Security is an important aspect of protecting the information society from a wide variety of threats. International Journal of Security (IJS) is a peer review open access online journal that published scientific research related to computer security and cryptography and also reaches out to other branches of the information security sciences. IJS aim to provide research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.The journal is intended to provide scientific knowledge in the field of access control and audit, attacks, security mechanisms, and security service, authentication, authorization, code security including mobile code security, confidentiality, privacy, integrity, design or analysis of security protocols and network and internet security.
IJS provides a platform to computer security experts, practitioners, executives, information security managers, academics, security consultants, executives, administrators, policy makers and graduate students to publish original, innovative and time-critical articles and other information describing research and good practices of important technical work in information security, whether theoretical, applicable, or related to implementation. IJS is also a platform for the sharing of ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community. IJS welcome contributions towards the precise understanding of security policies through modeling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware system implementing them.
READERSHIP
IJS is a recognized International scientific journal that mainly targets computer security experts, researchers, academics, executives, administrators, policy makers, information security managers, security consultants and industrial community relevant to computer security in the field of access control and audit, security mechanisms, code security, confidentiality, privacy and information hiding and watermarking by publishing latest research articles in order to provide assistance and promote developments and innovations made in the field of computer and information security.LIST OF TOPICS

Access control and audit

Anonymity

Anonymity and pseudonymity

Attacks, security mechanisms, and security service

Authentication

Authorisation

Biometrics

Cellular/wireless/mobile/satellite networks securi

Code security, including mobile code security

Computer forensics

Confidentiality, privacy, integrity, authenticatio

Cryptography and cryptanalysis

Data confidentiality issues

Data integrity issues

Data recovery

Database security

Denial of service

Denial of service attacks and countermeasures

Dependability and reliability

Design or analysis of security protocols

Distributed access control

Distributed and parallel systems security

Electronic commerce

Formal security analyses

Fraudulent usage

Information flow

Information hiding and watermarking

Intellectual property protection

Intrusion detection

Key management

Multicast security

Network and Internet security

Network forensics

Network security performance evaluation

Non-repudiation

Peer-to-peer security

Prevention of traffic analysis

Privacy protection

Public key cryptography and key management

Revocation of malicious parties

Risk assessment and management

Secure location determination

Secure PHY/MAC/routing protocols

Secure routing protocols

Security group communications

Security in ad hoc networks

Security in cellular networks (2G, 2.5G, 3G, B3G,

Security in communications

Security in content-delivery networks

Security in distributed systems

Security in domain name service

Security in e-mail

Security in high-speed networks

Security in integrated networks

Security in integrated wireless networks

Security in internet and WWW

Security in IP networks

Security in mobile IP

Security in optical systems and networks

Security in peer-to-peer networks

Security in satellite networks

Security in sensor networks

Security in VoIP

Security in wired and wireless integrated networks

Security in Wired Networks

Security in wireless communications

Security in wireless internet

Security in wireless LANs (IEEE 802.11 WLAN, WiFi,

Security in wireless MANs (IEEE 802.16 and WiMAX)

Security in wireless PANs (Bluetooth and IEEE 802.

Security policies

Security specification techniques

Security standards

Tradeoff analysis between performance and security

Trust establishment

Viruses worms and other malicious code

WLAN and Bluetooth security
ABSTRACTING & INDEXING |
CITATION ANALYSIS |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
The publications of IJS are abstracted and indexed in following databases and websites. |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|