ISSN: 0167-4048
Journal Home
Journal Guideline
Computers and Security Q1 Unclaimed
Computers and Security is a journal indexed in SJR in Law and Computer Science (miscellaneous) with an H index of 125. It has an SJR impact factor of 1,566 and it has a best quartile of Q1. It is published in English. It has an SJR impact factor of 1,566.
Computers and Security focuses its scope in these topics and keywords: social, information, improving, human, generation, file, exposureunderstanding, error, ensemble, integration, ...
Type: Journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
1,566
SJR Impact factor125
H Index444
Total Docs (Last Year)956
Total Docs (3 years)27945
Total Refs7554
Total Cites (3 years)952
Citable Docs (3 years)7.13
Cites/Doc (2 years)62.94
Ref/DocOther journals with similar parameters
Nature Sustainability Q1
International Organization Q1
Business Strategy and the Environment Q1
Review of Environmental Economics and Policy Q1
Global Environmental Change Q1
Compare this journals
Aims and Scope
Best articles by citations
Intranet firewalls offer no protection against the enemy within
View moreWriting infosec policies
View moreLock up your data
View moreOn the insecurity of arithmetic coding
View moreFeds limit info warfare role
View moreSmartcards - Is Britain getting smarter?
View moreMaking the most of hacker fears
View moreInformation protection for publishers
View moreProcedures to reduce the computer virus threat
View moreProtecting databases from inference attacks
View moreInternet Explorer security flaws
View moreAbstracts of Recent Articles and Literature
View moreComputer security in China
View moreA confidentiality system for ISDN inter-PC high-speed file transfer
View moreTechnology and trust: the final analysis
View moreTracking down trouble
View moreIn Rindos v Hardwick
View moreCyberspace lawsuits
View morePolice ruling reveals CMA weakness
View moreSupport for Security in Distributed Systems Using Messiahs
View moreThe changing rises associated with computer systems as reflected by disaster recovery experience
View moreInformation flow within the globally connected environment
View moreMCII offers secure transaction service
View moreFresh drive on mobile phone fraud
View more
Comments