研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Journal of Computer Security

短名JCS
Journal Impact0.90
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4)
ISSN0926-227X, 1875-8924
h-index59

《Journal of Computer Security》期刊发表在计算机安全领域具有持久意义的研究和开发成果,涵盖安全计算机系统和网络的理论、设计、实施、分析和应用。该期刊还为关于安全和隐私的意义及其影响提供了一个讨论平台,特别是那些对技术社区具有重要影响的议题。《Journal of Computer Security》为研究人员提供了一个发表更深入和更长篇幅文章的机会,这些文章在现有各种会议的论文集中难以实现,同时其读者群体是计算机安全领域的研究者,他们的专业背景通常比其他档案出版物的读者更为专业。

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统程序设计语言数学计算机网络政治学法学工程类算法哲学理论计算机科学生物人工智能万维网
出版信息出版商: IOS Press BV出版周期: 期刊类型: journal
基本数据创刊年份: 1995原创研究文献占比100.00%自引率:0.00%Gold OA占比: 4.23%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Benchmarking frameworks and comparative studies of Controller Area Network (CAN) intrusion detection systems: A review

2024-7-25

Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism

2024-7-25

SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence

2024-6-28

Analysis of neural network detectors for network attacks

2024-6-17

DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming

2024-6-17

Securing Images using Bifid Cipher associated with Arnold Map

2024-6-4

Identity-based chameleon hash from lattices

2024-6-3

Multi-hop sanitizable signature for collaborative edge computing

2024-5-31

Log2Graph: A graph convolution neural network based method for insider threat detection

2024-4-24

Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques

2024-4-23

A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud

2024-4-9

Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework

2024-4-9

StegEraser: Defending cybersecurity against malicious covert communications

2024-4-9

Cache attacks on subkey calculation of Blowfish

2024-4-9

Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1

2024-4-4

DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing

2024-3-8

MVDet: Encrypted malware traffic detection via multi-view analysis

2024-2-12

Prioritization and exchange chains in privacy-preserving kidney exchange

2024-2-5

Secure authentication protocols to resist off-line attacks on authentication data table

2024-2-2

Discriminative spatial-temporal feature learning for modeling network intrusion detection systems

2024-2-2

A multiview clustering framework for detecting deceptive reviews

2024-2-2

Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks

2024-2-1

E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system

2024-1-29

Accurate authentication based on ECG using deep learning

2024-1-16

Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework

2023-12-1

Proactive enforcement of provisions and obligations

2023-11-28

SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android

2023-11-28

StegEraser: Defending cybersecurity against malicious covert communications

2023-11-17

Cache attacks on subkey calculation of Blowfish

2023-11-17

Analysis of neural network detectors for network attacks

2023-11-17

Guest editors’ introduction

2023-11-3

How efficient are replay attacks against vote privacy? A formal quantitative analysis1

2023-10-13

Special issue: 35th IEEE Computer Security Symposium – CSF 2022

2023-10-13

Securing blockchain-based timed data release against adversarial attacks1

2023-9-26

Flow-limited authorization for consensus, replication, and secret sharing1

2023-9-22

Con2Mix: A semi-supervised method for imbalanced tabular security data1

2023-9-15

The intrinsic dimensionality of network datasets and its applications1

2023-9-12

Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption1

2023-9-12

A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud

2023-8-29

A formal model of Checked C1

2023-8-29

A review on cloud security issues and solutions

2023-8-14

A mutation-based approach for the formal and automated analysis of security ceremonies

2023-8-14

StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception

2023-8-14

Universal optimality and robust utility bounds for metric differential privacy1

2023-7-18

Symbolic protocol verification with dice1

2023-6-13

Machine-checked proofs of privacy against malicious boards for Selene & Co1

2023-6-9

Secure authentication protocols to resist off-line attacks on authentication data table

2023-6-6

Data privacy in the Internet of Things based on anonymization: A review

2023-5-29

Online User Authentication System Using Keystroke Dynamics

2023-5-29

IsaNet: A framework for verifying secure data plane protocols

2023-5-29

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司