Default: IET Information Security

ISSN: 1751-8709

Journal Home

Journal Guideline

IET Information Security Q2 Unclaimed

John Wiley and Sons Ltd United Kingdom
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

IET Information Security is a journal indexed in SJR in Software and Information Systems with an H index of 44. It has an SJR impact factor of 0,449 and it has a best quartile of Q2. It has an SJR impact factor of 0,449.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

IET Information Security

0,449

SJR Impact factor

44

H Index

50

Total Docs (Last Year)

137

Total Docs (3 years)

1934

Total Refs

322

Total Cites (3 years)

133

Citable Docs (3 years)

2.32

Cites/Doc (2 years)

38.68

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Adaptively secure broadcast encryption under standard assumptions with better efficiency

View more

Detecting lateral spear phishing attacks in organisations

View more

Detecting LDoS attack bursts based on queue distribution

View more

Self-adaptive approach for resource-aware security provisioning in wireless ad hoc networks

View more

Cryptanalysis of the Dragonfly key exchange protocol

View more

New second-order threshold implementation of AES

View more

Efficient chosen-ciphertext secure public-key encryption scheme with high leakage-resilience

View more

Detecting multiple H.264/AVC compressions with the same quantisation parameters

View more

Comparing and debugging firewall rule tables

View more

Aspectising honeytokens to contain the insider threat

View more

Security analysis of ABAC under an administrative model

View more

Approaching secure industrial control systems

View more
SHOW MORE ARTICLES

Differential fault analysis on LED using Super-Sbox

View more

Practical verifiably encrypted signature based on Waters signatures

View more

High-performance and high-speed implementation of polynomial basis Itoh-Tsujii inversion algorithm over GF(2 m )

View more

Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks

View more

Security analysis of two certificateless short signature schemes

View more

Privacy of a randomised skip lists-based protocol

View more

Malware classification based on API calls and behaviour analysis

View more

Distributed key generation protocol with hierarchical threshold access structure

View more

Robust audio watermarking using frequency-selective spread spectrum

View more

Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem

View more

Malware detection method based on the control-flow construct feature of software

View more

Analysis of bilinear pairing-based accumulator for identity escrowing

View more

FAQS