
|
|||||
|

![]() |
HOME | ![]() |
About IJS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJS | |||||||
|
CALL FOR PAPERS |
|
International Journal of Security (IJS) IMPORTANT DATES • ISSUES ARCHIVE • FORTHCOMING ARTICLES • PUBLICATIONS BY COUNTRIES, UNIVERSITIES, INSTITUTES & RESEARCH CENTERS • VIDEO PRESENTATIONS • OPEN ACCESS LIBRARY ABOUT IJS
EDITORIAL BOARD MEMBERS
LIST OF TOPICS ![]()
Access control and audit
![]()
Anonymity
![]()
Anonymity and pseudonymity
![]()
Attacks, security mechanisms, and security service
![]()
Authentication
![]()
Authorisation
![]()
Biometrics
![]()
Cellular/wireless/mobile/satellite networks securi
![]()
Code security, including mobile code security
![]()
Computer forensics
![]()
Confidentiality, privacy, integrity, authenticatio
![]()
Cryptography and cryptanalysis
![]()
Data confidentiality issues
![]()
Data integrity issues
![]()
Data recovery
![]()
Database security
![]()
Denial of service
![]()
Denial of service attacks and countermeasures
![]()
Dependability and reliability
![]()
Design or analysis of security protocols
![]()
Distributed access control
![]()
Distributed and parallel systems security
![]()
Electronic commerce
![]()
Formal security analyses
![]()
Fraudulent usage
![]()
Information flow
![]()
Information hiding and watermarking
![]()
Intellectual property protection
![]()
Intrusion detection
![]()
Key management
![]()
Multicast security
![]()
Network and Internet security
![]()
Network forensics
![]()
Network security performance evaluation
![]()
Non-repudiation
![]()
Peer-to-peer security
![]()
Prevention of traffic analysis
![]()
Privacy protection
![]()
Public key cryptography and key management
![]()
Revocation of malicious parties
![]()
Risk assessment and management
![]()
Secure location determination
![]()
Secure PHY/MAC/routing protocols
![]()
Secure routing protocols
![]()
Security group communications
![]()
Security in ad hoc networks
![]()
Security in cellular networks (2G, 2.5G, 3G, B3G,
![]()
Security in communications
![]()
Security in content-delivery networks
![]()
Security in distributed systems
![]()
Security in domain name service
![]()
Security in e-mail
![]()
Security in high-speed networks
![]()
Security in integrated networks
![]()
Security in integrated wireless networks
![]()
Security in internet and WWW
![]()
Security in IP networks
![]()
Security in mobile IP
![]()
Security in optical systems and networks
![]()
Security in peer-to-peer networks
![]()
Security in satellite networks
![]()
Security in sensor networks
![]()
Security in VoIP
![]()
Security in wired and wireless integrated networks
![]()
Security in Wired Networks
![]()
Security in wireless communications
![]()
Security in wireless internet
![]()
Security in wireless LANs (IEEE 802.11 WLAN, WiFi,
![]()
Security in wireless MANs (IEEE 802.16 and WiMAX)
![]()
Security in wireless PANs (Bluetooth and IEEE 802.
![]()
Security policies
![]()
Security specification techniques
![]()
Security standards
![]()
Tradeoff analysis between performance and security
![]()
Trust establishment
![]()
Viruses worms and other malicious code
![]()
WLAN and Bluetooth security
IJS Submission Guidelines - https://www.cscjournals.org/journals/IJS/submission-guidelines.php Register Your Special Issue - https://www.cscjournals.org/sm/si/step1.php
Sincerely |