ISSN: 1556-6013
Journal Home
Journal Guideline
IEEE Transactions on Information Forensics and Security Q1 Unclaimed
IEEE Transactions on Information Forensics and Security is a journal indexed in SJR in Computer Networks and Communications and Safety, Risk, Reliability and Quality with an H index of 167. It has an SJR impact factor of 2,89 and it has a best quartile of Q1. It has an SJR impact factor of 2,89.
IEEE Transactions on Information Forensics and Security focuses its scope in these topics and keywords: biometric, measures, vibrometry, evaluation, physiological, function, doppler, hoc, hierarchical, graphs, ...
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
2,89
SJR Impact factor167
H Index430
Total Docs (Last Year)969
Total Docs (3 years)21013
Total Refs8421
Total Cites (3 years)969
Citable Docs (3 years)7.51
Cites/Doc (2 years)48.87
Ref/DocOther journals with similar parameters
IEEE Journal on Selected Areas in Communications Q1
International Journal of Information Management Q1
IEEE Communications Magazine Q1
Synthesis Lectures on Communication Networks Q1
Information Systems Research Q1
Compare this journals
Aims and Scope
Best articles by citations
Addressing Missing Values in Kernel-Based Multimodal Biometric Fusion Using Neutral Point Substitution
View moreA Local-Concentration-Based Feature Extraction Approach for Spam Filtering
View moreCryptanalysis of Lightweight WG-8 Stream Cipher
View moreScalar DC-QIM for Semifragile Authentication
View moreWireless Secrecy Regions With Friendly Jamming
View moreNew Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator
View moreInformation Theory and the IrisCode
View moreGuest Editorial Special Issue on Facial Biometrics in the Wild
View moreVirus Propagation Modeling and Convergence Analysis in Large-Scale Networks
View moreSoftware Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks
View moreWireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications
View moreAnalysis of Facial Marks to Distinguish Between Identical Twins
View moreMEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones
View moreA Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers
View moreTeeth Segmentation in Digitized Dental X-Ray Films Using Mathematical Morphology
View moreThe Steganographer is the Outlier: Realistic Large-Scale Steganalysis
View moreNeural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings
View morePhysical-Layer Secrecy for OFDM Transmissions Over Fading Channels
View morePhysical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems
View moreRecognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases
View moreUse of Identification Trial Statistics for the Combination of Biometric Matchers
View moreSteganalysis for Markov Cover Data With Applications to Images
View moreA Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer
View moreWhite-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
View more
Comments