ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

International Journal of Information Security and Applications(IJISA)

Country/Region : India

Website :


International Journal of Information Security and Applications(IJISA)
ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print)
*****FREE Publishing ****
International Journal of Information Security and Applications(IJISA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Security and Applications. The journal focuses on all technical and practical aspects of Information Security and Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced Information Security concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Information Security and Applications.
Topics of interest include, but are not limited to, the following
 Cryptographic protocols
 Cryptography and Coding
 Untraceability
 Privacy and authentication
 Key management
 Authentication
 Trust Management
 Quantum cryptography
 Computational Intelligence in Security
 Artificial Immune Systems
 Biological & Evolutionary Computation
 Intelligent Agents and Systems
 Reinforcement & Unsupervised Learning
 Autonomy-Oriented Computing
 Coevolutionary Algorithms
 Fuzzy Systems
 Biometric Security
 Trust models and metrics
 Regulation and Trust Mechanisms
 Data Integrity
 Models for Authentication, Trust and Authorization
 Wireless Network Security
 Information Hiding
 Data & System Integrity
 E- Commerce
 Access Control and Intrusion Detection
 Intrusion Detection and Vulnerability Assessment
 Authentication and Non-repudiation
 Identification and Authentication
 Insider Threats and Countermeasures
 Intrusion Detection & Prevention
 Secure Cloud Computing
 Security Information Systems Architecture and Design and Security Patterns
 Security Management
 Security Requirements (threats, vulnerabilities, risk, formal methods, etc.)
 Sensor and Mobile Ad Hoc Network Security
 Service and Systems Design and QoS Network Security
 Software Security
 Security and Privacy in Mobile Systems
 Security and Privacy in Pervasive/Ubiquitous Computing
 Security and Privacy in Web Sevices
 Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering
 • Security for Grid ComputingSecurity in Distributed Systems
Paper Submission
Authors are invited to submit papers for this journal through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline :January 12, 2020
• Notification :January 24, 2020
• Final Manuscript Due :January 30, 2020
• Publication Date : Determined by the Editor-in-Chief
Here's where you can reach us:

Last modified: 2020-01-08 17:51:01