研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态

Journal of Information Security and Applications

短名J. Inf. Secur. Appl.
Journal Impact3.96
国际分区COMPUTER SCIENCE, INFORMATION SYSTEMS(Q2)
期刊索引SCI Q2中科院 2 区
ISSN2214-2126, 2214-2134
h-index64
国内分区计算机科学(2区)计算机科学计算机信息系统(3区)

《Journal of Information Security and Applications》(JISA)专注于信息安全及其应用领域的原创研究和实践驱动的应用。JISA通过提供对现代信息安全问题和挑战的清晰视角,促进科研界与行业专业人士之间的交流与合作。期刊内容涵盖国际知名的信息安全专家和研究人员的原创研究成果,以及创新的工业应用方法,旨在为读者提供最佳实践和前沿科学解决方案。

期刊主页投稿网址

阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!

涉及主题计算机科学计算机安全操作系统数学计算机网络工程类人工智能政治学法学算法程序设计语言加密生物物理密码学计算机视觉万维网经济地理数学分析生态学统计
出版信息出版商: Elsevier Ltd出版周期: 期刊类型: journal
基本数据创刊年份: 2013原创研究文献占比99.11%自引率:7.90%Gold OA占比: 9.47%

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS

点击下方按钮,免费开启试用!

最新文章

Shared file protection against unauthorised encryption using a Buffer-Based Signature Verification Method

2024-11-1

Moment invariants based zero watermarking algorithm for trajectory data

2024-11-1

Visualization-based comprehensive feature representation with improved EfficientNet for malicious file and variant recognition

2024-11-1

Enhanced Fourier–Mellin domain watermarking for social networking platforms

2024-9-17

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols

2024-9-12

Detection of Evasive Android Malware Using EigenGCN

2024-9-7

P-Chain: Towards privacy-aware smart contract using SMPC

2024-9-3

A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment

2024-9-1

ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

2024-9-1

Color image encryption scheme combining a 2D hyperchaotic Sin–Henon system and the division algorithm

2024-9-1

e-SAFE: A secure and efficient access control scheme with attribute convergence and user revocation in fog enhanced IoT for E-Health

2024-9-1

Towards accountable and privacy-preserving blockchain-based access control for data sharing

2024-9-1

Editorial Board

2024-9-1

Privacy-preserving logistic regression with improved efficiency

2024-9-1

Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet

2024-9-1

Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns

2024-9-1

A robust medical image zero-watermarking algorithm using Collatz and Fresnelet Transforms

2024-9-1

A different base approach for better efficiency on range proofs

2024-9-1

A DNN robust video watermarking method in dual-tree complex wavelet transform domain

2024-9-1

A deep reinforcement learning approach for security-aware service acquisition in IoT

2024-9-1

Enhancing the performance of convolutional neural network image-based steganalysis in spatial domain using Spatial Rich Model and 2D Gabor filters

2024-9-1

Post-quantum identity-based traitor tracing

2024-9-1

A cancellable iris template protection scheme based on inverse merger and Bloom filter

2024-9-1

Role and attribute-based access control scheme for decentralized medicine supply chain

2024-9-1

Contract-based hierarchical security aggregation scheme for enhancing privacy in federated learning

2024-9-1

Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing

2024-9-1

Comprehensively enhancing the security of control with combined homomorphic encryption

2024-9-1

Robust secret color image sharing anti-cropping and tampering in shares

2024-8-31

SQL injection attack: Detection, prioritization & prevention

2024-8-31

Efficient detection of intra/inter-frame video copy-move forgery: A hierarchical coarse-to-fine method

2024-8-24

Secure similar patients query with homomorphically evaluated thresholds

2024-8-19

Forensic analysis of web browsers lifecycle: A case study

2024-8-13

LSPR23: A novel IDS dataset from the largest live-fire cybersecurity exercise

2024-8-6

Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric

2024-8-5

A novel link fabrication attack detection method for low-latency SDN networks

2024-8-1

Corrigendum to “Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment” [Journal of Information Security and Applications 78 (2023) 103626]

2024-8-1

A comprehensive evaluation on the benefits of context based password cracking for digital forensics

2024-8-1

Source printer identification from document images acquired using smartphone

2024-8-1

Keeping classical distinguisher and neural distinguisher in balance

2024-8-1

Enabling security risk assessment and management for business process models

2024-8-1

Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer

2024-7-26

Blockchain in inter-organizational collaboration: A privacy-preserving voting system for collective decision-making

2024-7-26

Semi-supervised QIM steganalysis with ladder networks

2024-7-24

Improving image steganography security via ensemble steganalysis and adversarial perturbation minimization

2024-7-23

Editorial Board

2024-7-22

NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research

2024-7-18

Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding

2024-7-11

Specifying cycles of minimal length for commonly used linear layers in block ciphers

2024-7-4

SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world

2024-7-2

Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles

2024-6-29

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司