Default: ACM Transactions on Information and System Security

ISSN: 1094-9224

Journal Home

Journal Guideline

ACM Transactions on Information and System Security Q1 Unclaimed

Association for Computing Machinery (ACM) United States
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

ACM Transactions on Information and System Security is a journal indexed in SJR in Computer Science (miscellaneous) and Safety, Risk, Reliability and Quality with an H index of 78. It has a price of 2040 €. It has a best quartile of Q1. It is published in English.

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

2040 €

Inmediate OA

NPD

Embargoed OA

0 €

Non OA

Metrics

ACM Transactions on Information and System Security

-

SJR Impact factor

78

H Index

0

Total Docs (Last Year)

5

Total Docs (3 years)

0

Total Refs

26

Total Cites (3 years)

5

Citable Docs (3 years)

0

Cites/Doc (2 years)

0.0

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Cryptanalysis of the random number generator of the Windows operating system

View more

Cost profile of a highly assured, secure operating system

View more

Behavioral Study of Users When Interacting with Active Honeytokens

View more

Preface

View more

Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings

View more

Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings

View more

Editorial

View more

Guest editorial

View more

MPSS

View more

Security Analysis of Accountable Anonymity in Dissent

View more

Enforceable security policies

View more

Data Collection with Self-Enforcing Privacy

View more
SHOW MORE ARTICLES

The ARBAC97 model for role-based administration of roles

View more

An effective role administration model using organization structure

View more

A New Framework for Privacy-Preserving Aggregation of Time-Series Data

View more

Enforcing access control in Web-based social networks

View more

Comparing Vulnerability Severity and Exploits Using Case-Control Studies

View more

Guest Editorial

View more

Relations among privacy notions

View more

Signature schemes based on the strong RSA assumption

View more

Attack-Resistant Location Estimation in Wireless Sensor Networks

View more

Toward Robotic Robbery on the Touch Screen

View more

Hypothesizing and reasoning about attacks missed by intrusion detection systems

View more

The specification and enforcement of authorization constraints in workflow management systems

View more

FAQS