Journal Information
Journal of Information Security and Applications (JISA)
http://www.journals.elsevier.com/journal-of-information-security-and-applications/Impact Factor: |
3.872 |
Publisher: |
Elsevier |
ISSN: |
2214-2126 |
Viewed: |
18202 |
Tracked: |
20 |
Call For Papers
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers. The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA. JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications. Current JISA topics Authentication and access control Anonymity and privacy Cryptographic protection Digital forensics Human factors in security Multimedia security Network and mobile security Security management and policies Hardware and physical security
Last updated by Dou Sun in 2022-01-29
Special Issues
Special Issue on Recent Advances in Personal Human Identification based on Biomedical TraitsSubmission Date: 2023-08-15Biometrics can be defined as a technology which recognizes individuals by their physical or behavioral characteristics. This common definition is often employed by considering Biometrics as a security solution to deal with the identification or verification of individuals. Nowadays, Biometric technology is not restricted to law enforcement or government departments by identifying criminals or by controlling borders, but it is also accessible and used in almost everyday life. It allows a more secure access as well as making our life easier. Due to the fact that Biometric systems are commonly integrated into general purpose devices such as smartphones and computers, the attitude of the general public has changed towards them because it has become more acceptable. In addition, the commercial Biometric industry is still growing and is continually being innovated, so it is not surprising the conventional metal key and passwords will not be used anymore as we know it today. Guest editors: Associate Professor Imad RidaUniversité de Technologie de Compiègneimad.rida@utc.fr Associate Professor Richard JiangDepartment of Computing and CommunicationsLancaster Universityr.jiang2@lancaster.ac.uk Professor Xudong JiangSchool of Electrical and Electronic EngineeringNanyang Technological Universityexdjiang@ntu.edu.sg Dr. Abdenour HadidSorbonne Center for Artificial IntelligenceSorbonne University Abu DhabiAbdenour.Hadid@sorbonne.ae Professor Julian FierrezBiometrics and Data Pattern Analytics LabAutonomous University of Madridjulian.fierrez@uam.es Professor Amine Nait-aliUniversité Paris Est Créteilnaitali@u-pec.fr Assistant Professor Chintan BhattPandit Deendayal Energy UniversityChintan.Bhatt@sot.pdpu.ac.in
Last updated by Dou Sun in 2023-05-15
Related Journals
CCF | Full Name | Impact Factor | Publisher | ISSN |
---|---|---|---|---|
International Journal of Information Security | 1.988 | Springer | 1615-5262 | |
c | IET Information Security | 0.862 | IET | 1751-8709 |
c | International Journal of Information Security and Privacy | Idea Group Inc | 1930-1650 | |
International Journal of Network Security & Its Applications | AIRCC | 0975-2307 | ||
International Journal on Computational Science & Applications | AIRCC | 2200-0011 | ||
Information Security Technical Report | Elsevier | 1363-4127 | ||
Journal of Optimization Theory and Applications | 2.249 | Springer | 0022-3239 | |
International Journal of Computational Geometry and Applications | World Scientific | 0218-1959 | ||
a | Information and Computation | 0.704 | Elsevier | 0890-5401 |
b | ACM Transactions of Information and System Security | ACM | 1094-9224 |
Full Name | Impact Factor | Publisher |
---|---|---|
International Journal of Information Security | 1.988 | Springer |
IET Information Security | 0.862 | IET |
International Journal of Information Security and Privacy | Idea Group Inc | |
International Journal of Network Security & Its Applications | AIRCC | |
International Journal on Computational Science & Applications | AIRCC | |
Information Security Technical Report | Elsevier | |
Journal of Optimization Theory and Applications | 2.249 | Springer |
International Journal of Computational Geometry and Applications | World Scientific | |
Information and Computation | 0.704 | Elsevier |
ACM Transactions of Information and System Security | ACM |
Related Conferences
Short | Full Name | Submission | Conference |
---|---|---|---|
CISCE | International Conference on Communications, Information System and Computer Engineering | 2021-04-07 | 2021-05-14 |
3PGCIC | International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2015-07-31 | 2015-11-04 |
EMSA | International Conference on Embedded Systems and Applications | 2023-03-04 | 2023-03-18 |
ICDMM | International Conference on Design, Manufacturing and Mechatronics | 2017-05-19 | 2017-05-26 |
FGCN | International Conference on Future Generation Communication and Networking | 2015-06-30 | 2015-11-25 |
CloudNet | International Conference on Cloud Networking | 2023-06-23 | 2023-11-01 |
WINE | Conference on Web and Internet Economics | 2022-07-07 | 2022-12-12 |
WIVEC | International Symposium on Wireless Vehicular Communications | 2012-11-20 | 2013-06-02 |
CSITY | International Conference on Computer Science, Engineering and Information Technology | 2022-08-20 | 2022-09-24 |
ICFGIT | International Conference on Future Generation Information Technology | 2022-05-04 | 2022-06-13 |
Recommendation