Default: IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Journal Home

Journal Guideline

IEEE Transactions on Information Forensics and Security Q1 Unclaimed

Institute of Electrical and Electronics Engineers Inc. United States
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

IEEE Transactions on Information Forensics and Security is a journal indexed in SJR in Computer Networks and Communications and Safety, Risk, Reliability and Quality with an H index of 133. It has an SJR impact factor of 1,613 and it has a best quartile of Q1. It has an SJR impact factor of 1,613.

IEEE Transactions on Information Forensics and Security focuses its scope in these topics and keywords: biometric, measures, vibrometry, evaluation, physiological, function, doppler, hoc, hierarchical, graphs, ...

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

IEEE Transactions on Information Forensics and Security

1,613

SJR Impact factor

133

H Index

285

Total Docs (Last Year)

704

Total Docs (3 years)

12518

Total Refs

7218

Total Cites (3 years)

702

Citable Docs (3 years)

10,45

Cites/Doc (2 years)

43,92

Ref/Doc

Comments

No comments ... Be the first to comment!

Aims and Scope


biometric, measures, vibrometry, evaluation, physiological, function, doppler, hoc, hierarchical, graphs, give, networksreducing, multigrade, outsourced, perturbation, privacypreserving, querieslaser, geoindistinguishable, frequent, authentication, based, capabilitieslaser, capabilitieswhen, cloud, connection, control, dataa, delay, dos, encrypted, enhancing, flexible,



Best articles by citations

Addressing Missing Values in Kernel-Based Multimodal Biometric Fusion Using Neutral Point Substitution

View more

A Local-Concentration-Based Feature Extraction Approach for Spam Filtering

View more

Cryptanalysis of Lightweight WG-8 Stream Cipher

View more

Scalar DC-QIM for Semifragile Authentication

View more

Wireless Secrecy Regions With Friendly Jamming

View more

New Steganalytic Features for Spatial Image Steganography Based on Derivative Filters and Threshold LBP Operator

View more

Information Theory and the IrisCode

View more

Guest Editorial Special Issue on Facial Biometrics in the Wild

View more

Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks

View more

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

View more

Wireless-Powered Full-Duplex Relay and Friendly Jamming for Secure Cooperative Communications

View more

Analysis of Facial Marks to Distinguish Between Identical Twins

View more
SHOW MORE ARTICLES

MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones

View more

A Fast Parts-Based Approach to Speaker Verification Using Boosted Slice Classifiers

View more

Teeth Segmentation in Digitized Dental X-Ray Films Using Mathematical Morphology

View more

The Steganographer is the Outlier: Realistic Large-Scale Steganalysis

View more

Neural Markers of Cybersecurity: An fMRI Study of Phishing and Malware Warnings

View more

Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels

View more

Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems

View more

Recognizing Rotated Faces From Frontal and Side Views: An Approach Toward Effective Use of Mugshot Databases

View more

Use of Identification Trial Statistics for the Combination of Biometric Matchers

View more

Steganalysis for Markov Cover Data With Applications to Images

View more

A Privacy-Preserving Buyer-Seller Watermarking Protocol Based on Priced Oblivious Transfer

View more

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes

View more

FAQS