研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
Information Security Journal
短名 | Inf. Secur. J.: Global Perspect. |
Journal Impact | 1.54 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q3) |
ISSN | 1939-3547, 1939-3555 |
h-index | 32 |
《Information Security Journal》旨在为安全专业人士提供有关新技术、有用工具和相关政策与技术研究的信息。我们还希望深入探讨当前和现有的职业发展问题。我们欢迎涵盖以下主题的投稿:安全访问控制系统与安全方法论、安全电信与网络安全、业务连续性规划与灾难恢复规划、安全管理实践、安全架构与模型、信息安全中的法律、调查与伦理、应用与系统开发安全、密码学安全、计算机操作安全和物理安全。我们特别希望收到探讨云安全、医疗信息安全与隐私以及网络取证的稿件。
期刊主页阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统数学政治学法学计算机网络工程类程序设计语言人工智能生物业务万维网算法经济加密 |
出版信息 | 出版商: Taylor and Francis Ltd.,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2008,原创研究文献占比: 93.10%,自引率:6.20%, Gold OA占比: 5.50% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Biometric access system with automatic registration and loyalty check in the system of recognition and database entry
2024-9-16
ECDSA-secured blockchain architecture for interoperable healthcare in the Internet of Robotic Things (IoRT)
2024-9-12
“The pull to do nothing would be strong”: limitations & opportunities in reporting insider threats
2024-8-10
SIFG: an ensemble model for sieving fake news from genuine without metadata by combining syntactic and semantic features
2024-7-17
Industrial espionage: window of opportunity
2024-7-14
A deep learning-driven fingerprint verification model for enhancing exam integrity in Moroccan higher education
2024-7-2
A hybrid CNN-GRU-based intrusion detection system for secure communication in vehicular adhoc network
2024-6-16
An explainable machine learning-based web attack detection system for industrial IoT web application security
2024-6-10
One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses
2024-5-31
SSHAA: A Python Package Index for visualizing features of SSH attacks with text mining in classification
2024-5-23
A secure and transparent communication mechanism based on blockchain and fuzzy evaluation matrix in metaverse industry 4.0
2024-5-18
Prevention of DDoS attacks: a comprehensive review and future directions
2024-5-15
Towards improving the security of wireless networks using secured session keys
2024-5-6
Evaluating the status of information security management in faculty libraries: a case study of Allameh Tabatabai University
2024-5-1
A comprehensive survey on mobile browser security issues, challenges and solutions
2024-4-29
A framework for security improvement on usage of mobile money application based on iris biometric authentication method
2024-4-28
Operational cyber incident coordination revisited: providing cyber situational awareness across organizations and countries
2024-4-18
A new early warning system based on metaheuristics in CPS architecture
2024-4-12
“A lightweight authentication scheme for 6LoWPAN-based Internet-of -things”
2024-4-11
A zero-watermarking approach for DICOM images authentication based on Jacobian model
2024-4-8
Adversarially robust and real-time DDoS detection and classification framework using AutoML
2024-4-4
A randomized encryption algorithm for the MPEG-DASH digital rights management
2024-3-30
A personal information privacy perceptions model for university students
2024-3-24
Chaos based Medical Image Encryption Techniques: A Comprehensive Review and Analysis
2024-2-13
Biometric passport security based on face recognition and biometric encryption using secure force algorithm into the HCC2D code
2024-2-6
Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques
2024-1-27
An effective cloud computing model enhancing privacy in cloud computing
2024-1-25
Security literacy model for strategic, tactical, & operational management levels
2024-1-21
Correction
2024-1-20
Privacy preservation of inventory management using adaptive key generation with Hyperledger blockchain technology
2023-12-30
Secure query processing and optimization in cloud environment: a review
2023-12-20
Cybersecurity: a tool for curbing examination breaches and improvement of the quality of large-scale educational assessments
2023-11-21
An AI Based IDS Framework For Detecting DDoS Attacks In Cloud Environment
2023-11-10
Information security failures identified and measured – ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis
2023-10-18
Internet governance and cyber-security: a systematic literature review
2023-10-16
Lattice attacks on pairing-based signatures
2023-10-9
Certificateless directed signature scheme without bilinear pairing
2023-10-6
Privacy and biometrics for smart healthcare systems: attacks, and techniques
2023-10-3
Using software metrics for predicting vulnerable classes in java and python based systems
2023-7-28
Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm
2023-6-29
User perception of Context-Based Micro-Training – a method for cybersecurity training
2023-6-9
Securing AMI-IoT networks against multiple RPL attacks using ensemble learning IDS and light-chain based prediction detection and mitigation mechanisms
2023-6-1
The evolution of global cybersecurity norms in the digital age: A longitudinal study of the cybersecurity norm development process
2023-4-21
A lightweight group key management scheme with constant rekeying cost and public bulletin size
2023-4-21
Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review
2023-3-28
URL filtering using machine learning algorithms
2023-3-28
Game-based security proofs for verifiable secret sharing schemes in the standard model
2022-12-29
BVOT: self-tallying boardroom voting with oblivious transfer
2022-11-2
Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment
2022-10-17
Mitigation strategies for distributed denial of service (DDoS) in SDN: A survey and taxonomy
2022-10-7
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远