Default: Computers and Security

ISSN: 0167-4048

Journal Home

Journal Guideline

Computers and Security Q1 Unclaimed

Elsevier Ltd. United Kingdom
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Computers and Security is a journal indexed in SJR in Law and Computer Science (miscellaneous) with an H index of 92. It has an SJR impact factor of 0,861 and it has a best quartile of Q1. It is published in English. It has an SJR impact factor of 0,861.

Computers and Security focuses its scope in these topics and keywords: social, information, improving, human, generation, file, exposureunderstanding, error, ensemble, integration, ...

Type: Journal

Type of Copyright:

Languages: English

Open Access Policy:

Type of publications:

Publication frecuency: -


- €

Inmediate OA


Embargoed OA

- €

Non OA


Computers and Security


SJR Impact factor


H Index


Total Docs (Last Year)


Total Docs (3 years)


Total Refs


Total Cites (3 years)


Citable Docs (3 years)


Cites/Doc (2 years)




No comments ... Be the first to comment!

Aims and Scope

social, information, improving, human, generation, file, exposureunderstanding, error, ensemble, integration, intrusion, planned, parameters, online, networks, network, motivation, malware, login, encryption, email, digital, certificateless, behavior, behaviours, browser, challenges, cloudofthings, codes, communicationimproved, complementary, compliance, control, correction, cybersecurity, deduction, design, detection,

Best articles by citations

Intranet firewalls offer no protection against the enemy within

View more

Writing infosec policies

View more

Lock up your data

View more

On the insecurity of arithmetic coding

View more

Feds limit info warfare role

View more

Smartcards - Is Britain getting smarter?

View more

Making the most of hacker fears

View more

Information protection for publishers

View more

Procedures to reduce the computer virus threat

View more

Protecting databases from inference attacks

View more

Internet Explorer security flaws

View more

Abstracts of Recent Articles and Literature

View more

Computer security in China

View more

A confidentiality system for ISDN inter-PC high-speed file transfer

View more

Technology and trust: the final analysis

View more

Tracking down trouble

View more

In Rindos v Hardwick

View more

Cyberspace lawsuits

View more

Police ruling reveals CMA weakness

View more

Support for Security in Distributed Systems Using Messiahs

View more

The changing rises associated with computer systems as reflected by disaster recovery experience

View more

Information flow within the globally connected environment

View more

MCII offers secure transaction service

View more

Fresh drive on mobile phone fraud

View more