ISSN: 1094-9224
Journal Home
Journal Guideline
ACM Transactions on Information and System Security Q1 Unclaimed
ACM Transactions on Information and System Security is a journal indexed in SJR in Computer Science (miscellaneous) and Safety, Risk, Reliability and Quality with an H index of 78. It has a price of 2040 €. It has a best quartile of Q1. It is published in English.
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -
2040 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
-
SJR Impact factor78
H Index0
Total Docs (Last Year)5
Total Docs (3 years)0
Total Refs26
Total Cites (3 years)5
Citable Docs (3 years)0
Cites/Doc (2 years)0.0
Ref/DocOther journals with similar parameters
Advances in Computers Q1
ACM Computing Surveys Q1
Proceedings of the IEEE Q1
IEEE Transactions on Smart Grid Q1
Foundations and Trends in Information Retrieval Q1
Compare this journals
Aims and Scope
Best articles by citations
Cryptanalysis of the random number generator of the Windows operating system
View moreCost profile of a highly assured, secure operating system
View moreBehavioral Study of Users When Interacting with Active Honeytokens
View morePreface
View moreExamining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
View moreExamining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings
View moreEditorial
View moreGuest editorial
View moreMPSS
View moreSecurity Analysis of Accountable Anonymity in Dissent
View moreEnforceable security policies
View moreData Collection with Self-Enforcing Privacy
View moreThe ARBAC97 model for role-based administration of roles
View moreAn effective role administration model using organization structure
View moreA New Framework for Privacy-Preserving Aggregation of Time-Series Data
View moreEnforcing access control in Web-based social networks
View moreComparing Vulnerability Severity and Exploits Using Case-Control Studies
View moreGuest Editorial
View moreRelations among privacy notions
View moreSignature schemes based on the strong RSA assumption
View moreAttack-Resistant Location Estimation in Wireless Sensor Networks
View moreToward Robotic Robbery on the Touch Screen
View moreHypothesizing and reasoning about attacks missed by intrusion detection systems
View moreThe specification and enforcement of authorization constraints in workflow management systems
View more
Comments