研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Information Security Journal

短名Inf. Secur. J.: Global Perspect.
Journal Impact1.54
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3)
ISSN1939-3547, 1939-3555
h-index32

《Information Security Journal》旨在为安全专业人士提供有关新技术、有用工具和相关政策与技术研究的信息。我们还希望深入探讨当前和现有的职业发展问题。我们欢迎涵盖以下主题的投稿:安全访问控制系统与安全方法论、安全电信与网络安全、业务连续性规划与灾难恢复规划、安全管理实践、安全架构与模型、信息安全中的法律、调查与伦理、应用与系统开发安全、密码学安全、计算机操作安全和物理安全。我们特别希望收到探讨云安全、医疗信息安全与隐私以及网络取证的稿件。

期刊主页

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统数学政治学法学计算机网络工程类程序设计语言人工智能生物业务万维网算法经济加密
出版信息出版商: Taylor and Francis Ltd.出版周期: 期刊类型: journal
基本数据创刊年份: 2008原创研究文献占比93.10%自引率:6.20%Gold OA占比: 5.50%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Biometric access system with automatic registration and loyalty check in the system of recognition and database entry

2024-9-16

ECDSA-secured blockchain architecture for interoperable healthcare in the Internet of Robotic Things (IoRT)

2024-9-12

“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats

2024-8-10

SIFG: an ensemble model for sieving fake news from genuine without metadata by combining syntactic and semantic features

2024-7-17

Industrial espionage: window of opportunity

2024-7-14

A deep learning-driven fingerprint verification model for enhancing exam integrity in Moroccan higher education

2024-7-2

A hybrid CNN-GRU-based intrusion detection system for secure communication in vehicular adhoc network

2024-6-16

An explainable machine learning-based web attack detection system for industrial IoT web application security

2024-6-10

One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses

2024-5-31

SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification

2024-5-23

A secure and transparent communication mechanism based on blockchain and fuzzy evaluation matrix in metaverse industry 4.0

2024-5-18

Prevention of DDoS attacks: a comprehensive review and future directions

2024-5-15

Towards improving the security of wireless networks using secured session keys

2024-5-6

Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University

2024-5-1

A comprehensive survey on mobile browser security issues, challenges and solutions

2024-4-29

A framework for security improvement on usage of mobile money application based on iris biometric authentication method

2024-4-28

Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries

2024-4-18

A new early warning system based on metaheuristics in CPS architecture

2024-4-12

“A lightweight authentication scheme for 6LoWPAN-based Internet-of -things”

2024-4-11

A zero-watermarking approach for DICOM images authentication based on Jacobian model

2024-4-8

Adversarially robust and real-time DDoS detection and classification framework using AutoML

2024-4-4

A randomized encryption algorithm for the MPEG-DASH digital rights management

2024-3-30

A personal information privacy perceptions model for university students

2024-3-24

Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis

2024-2-13

Biometric passport security based on face recognition and biometric encryption using secure force algorithm into the HCC2D code

2024-2-6

Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques

2024-1-27

An effective cloud computing model enhancing privacy in cloud computing

2024-1-25

Security literacy model for strategic, tactical, & operational management levels

2024-1-21

Correction

2024-1-20

Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology

2023-12-30

Secure query processing and optimization in cloud environment: a review

2023-12-20

Cybersecurity: a tool for curbing examination breaches and improvement of the quality of large-scale educational assessments

2023-11-21

An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment

2023-11-10

Information security failures identified and measured – ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis

2023-10-18

Internet governance and cyber-security: a systematic literature review

2023-10-16

Lattice attacks on pairing-based signatures

2023-10-9

Certificateless directed signature scheme without bilinear pairing

2023-10-6

Privacy and biometrics for smart healthcare systems: attacks, and techniques

2023-10-3

Using software metrics for predicting vulnerable classes in java and python based systems

2023-7-28

Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm

2023-6-29

User perception of Context-Based Micro-Training – a method for cybersecurity training

2023-6-9

Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms

2023-6-1

The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process

2023-4-21

A lightweight group key management scheme with constant rekeying cost and public bulletin size

2023-4-21

Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review

2023-3-28

URL filtering using machine learning algorithms

2023-3-28

Game-based security proofs for verifiable secret sharing schemes in the standard model

2022-12-29

BVOT: self-tallying boardroom voting with oblivious transfer

2022-11-2

Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment

2022-10-17

Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy

2022-10-7

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司