研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
Journal of Information Security and Applications
短名 | J. Inf. Secur. Appl. |
Journal Impact | 3.96 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2) |
期刊索引 | SCI Q2中科院 2 区 |
ISSN | 2214-2126, 2214-2134 |
h-index | 64 |
国内分区 | 计算机科学(2区)计算机科学计算机信息系统(3区) |
《Journal of Information Security and Applications》(JISA)专注于信息安全及其应用领域的原创研究和实践驱动的应用。JISA通过提供对现代信息安全问题和挑战的清晰视角,促进科研界与行业专业人士之间的交流与合作。期刊内容涵盖国际知名的信息安全专家和研究人员的原创研究成果,以及创新的工业应用方法,旨在为读者提供最佳实践和前沿科学解决方案。
期刊主页投稿网址阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | 计算机科学计算机安全操作系统数学计算机网络工程类人工智能政治学法学算法程序设计语言加密生物物理密码学计算机视觉万维网经济地理数学分析生态学统计 |
出版信息 | 出版商: Elsevier Ltd,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2013,原创研究文献占比: 99.11%,自引率:7.90%, Gold OA占比: 9.47% |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method
2024-11-1
Moment invariants based zero watermarking algorithm for trajectory data
2024-11-1
Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition
2024-11-1
Enhanced Fourier–Mellin domain watermarking for social networking platforms
2024-9-17
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols
2024-9-12
Detection of Evasive Android Malware Using EigenGCN
2024-9-7
P-Chain: Towards privacy-aware smart contract using SMPC
2024-9-3
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment
2024-9-1
ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks
2024-9-1
Color image encryption scheme combining a 2D hyperchaotic Sin–Henon system and the division algorithm
2024-9-1
e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health
2024-9-1
Towards accountable and privacy-preserving blockchain-based access control for data sharing
2024-9-1
Editorial Board
2024-9-1
Privacy-preserving logistic regression with improved efficiency
2024-9-1
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet
2024-9-1
Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns
2024-9-1
A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms
2024-9-1
A different base approach for better efficiency on range proofs
2024-9-1
A DNN robust video watermarking method in dual-tree complex wavelet transform domain
2024-9-1
A deep reinforcement learning approach for security-aware service acquisition in IoT
2024-9-1
Enhancing the performance of convolutional neural network image-based steganalysis in spatial domain using Spatial Rich Model and 2D Gabor filters
2024-9-1
Post-quantum identity-based traitor tracing
2024-9-1
A cancellable iris template protection scheme based on inverse merger and Bloom filter
2024-9-1
Role and attribute-based access control scheme for decentralized medicine supply chain
2024-9-1
Contract-based hierarchical security aggregation scheme for enhancing privacy in federated learning
2024-9-1
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing
2024-9-1
Comprehensively enhancing the security of control with combined homomorphic encryption
2024-9-1
Robust secret color image sharing anti-cropping and tampering in shares
2024-8-31
SQL injection attack: Detection, prioritization & prevention
2024-8-31
Efficient detection of intra/inter-frame video copy-move forgery: A hierarchical coarse-to-fine method
2024-8-24
Secure similar patients query with homomorphically evaluated thresholds
2024-8-19
Forensic analysis of web browsers lifecycle: A case study
2024-8-13
LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise
2024-8-6
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric
2024-8-5
A novel link fabrication attack detection method for low-latency SDN networks
2024-8-1
Corrigendum to “Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment” [Journal of Information Security and Applications 78 (2023) 103626]
2024-8-1
A comprehensive evaluation on the benefits of context based password cracking for digital forensics
2024-8-1
Source printer identification from document images acquired using smartphone
2024-8-1
Keeping classical distinguisher and neural distinguisher in balance
2024-8-1
Enabling security risk assessment and management for business process models
2024-8-1
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer
2024-7-26
Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making
2024-7-26
Semi-supervised QIM steganalysis with ladder networks
2024-7-24
Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization
2024-7-23
Editorial Board
2024-7-22
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research
2024-7-18
Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding
2024-7-11
Specifying cycles of minimal length for commonly used linear layers in block ciphers
2024-7-4
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world
2024-7-2
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles
2024-6-29
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远