研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
Journal of Computer Security
短名 | JCS |
Journal Impact | 0.90 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 0926-227X, 1875-8924 |
h-index | 59 |
《Journal of Computer Security》期刊发表在计算机安全领域具有持久意义的研究和开发成果,涵盖安全计算机系统和网络的理论、设计、实施、分析和应用。该期刊还为关于安全和隐私的意义及其影响提供了一个讨论平台,特别是那些对技术社区具有重要影响的议题。《Journal of Computer Security》为研究人员提供了一个发表更深入和更长篇幅文章的机会,这些文章在现有各种会议的论文集中难以实现,同时其读者群体是计算机安全领域的研究者,他们的专业背景通常比其他档案出版物的读者更为专业。
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统程序设计语言数学计算机网络政治学法学工程类算法哲学理论计算机科学生物人工智能万维网 |
出版信息 | 出版商: IOS Press BV,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 1995,原创研究文献占比: 100.00%,自引率:0.00%, Gold OA占比: 4.23% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Benchmarking frameworks and comparative studies of Controller Area Network (CAN) intrusion detection systems: A review
2024-7-25
Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism
2024-7-25
SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence
2024-6-28
Analysis of neural network detectors for network attacks
2024-6-17
DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming
2024-6-17
Securing Images using Bifid Cipher associated with Arnold Map
2024-6-4
Identity-based chameleon hash from lattices
2024-6-3
Multi-hop sanitizable signature for collaborative edge computing
2024-5-31
Log2Graph: A graph convolution neural network based method for insider threat detection
2024-4-24
Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques
2024-4-23
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud
2024-4-9
Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework
2024-4-9
StegEraser: Defending cybersecurity against malicious covert communications
2024-4-9
Cache attacks on subkey calculation of Blowfish
2024-4-9
Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1
2024-4-4
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing
2024-3-8
MVDet: Encrypted malware traffic detection via multi-view analysis
2024-2-12
Prioritization and exchange chains in privacy-preserving kidney exchange
2024-2-5
Secure authentication protocols to resist off-line attacks on authentication data table
2024-2-2
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems
2024-2-2
A multiview clustering framework for detecting deceptive reviews
2024-2-2
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks
2024-2-1
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system
2024-1-29
Accurate authentication based on ECG using deep learning
2024-1-16
Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework
2023-12-1
Proactive enforcement of provisions and obligations
2023-11-28
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android
2023-11-28
StegEraser: Defending cybersecurity against malicious covert communications
2023-11-17
Cache attacks on subkey calculation of Blowfish
2023-11-17
Analysis of neural network detectors for network attacks
2023-11-17
Guest editors’ introduction
2023-11-3
How efficient are replay attacks against vote privacy? A formal quantitative analysis1
2023-10-13
Special issue: 35th IEEE Computer Security Symposium – CSF 2022
2023-10-13
Securing blockchain-based timed data release against adversarial attacks1
2023-9-26
Flow-limited authorization for consensus, replication, and secret sharing1
2023-9-22
Con2Mix: A semi-supervised method for imbalanced tabular security data1
2023-9-15
The intrinsic dimensionality of network datasets and its applications1
2023-9-12
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption1
2023-9-12
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud
2023-8-29
A formal model of Checked C1
2023-8-29
A review on cloud security issues and solutions
2023-8-14
A mutation-based approach for the formal and automated analysis of security ceremonies
2023-8-14
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception
2023-8-14
Universal optimality and robust utility bounds for metric differential privacy1
2023-7-18
Symbolic protocol verification with dice1
2023-6-13
Machine-checked proofs of privacy against malicious boards for Selene & Co1
2023-6-9
Secure authentication protocols to resist off-line attacks on authentication data table
2023-6-6
Data privacy in the Internet of Things based on anonymization: A review
2023-5-29
Online User Authentication System Using Keystroke Dynamics
2023-5-29
IsaNet: A framework for verifying secure data plane protocols
2023-5-29
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远