ISSN: 1939-3555
Journal Home
Journal Guideline
Information Security Journal Q2 Unclaimed
Information Security Journal is a journal indexed in SJR in Software and Computer Science Applications with an H index of 32. It has a price of 2395 €. It has an SJR impact factor of 0,546 and it has a best quartile of Q2. It has an SJR impact factor of 0,546.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -


2395 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,546
SJR Impact factor32
H Index37
Total Docs (Last Year)93
Total Docs (3 years)1886
Total Refs310
Total Cites (3 years)93
Citable Docs (3 years)2.85
Cites/Doc (2 years)50.97
Ref/DocOther journals with similar parameters
Cognitive Systems Research Q2
IEEE Software Q2
ACM Transactions on Programming Languages and Systems Q2
Peer-to-Peer Networking and Applications Q2
Computer Communication Review Q2
Compare this journals
Aims and Scope
Best articles by citations
Conficker: Lessons in Secure Software and System Design
View moreAn Authentication and Authorization Solution for a Multiplatform Cloud Environment
View moreOn the Hardware Implementation Cost of Crypto-Processors Architectures
View moreEnhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing
View moreAn Overview of Modern Botnets
View moreFrom the Editor's Desk
View moreOverview of Information Security Using Genetic Algorithm and Chaos
View moreFrom the Editor's Desk
View moreInvestigating Information Security Awareness: Research and Practice Gaps
View moreA Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia
View moreEnhanced Timeline Analysis for Digital Forensic Investigations
View moreTrust Ensuring Crisis Management Hardware Module
View moreSecurity and Control in the Cloud
View moreUsing the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters
View moreApplying Security within a Service-Oriented Architecture
View moreGuest Editorial: Cryptographic Hardware-A Short, Practical Checklist
View moreA Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack
View moreA survey of applications of threshold cryptography - proposed and practiced
View moreInformation Security Awareness Status of Business College: Undergraduate Students
View moreUsing Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS
View moreCorporate Expectations of the IT Department in an Age of Terrorism: Ensuring "Battle Readiness"
View moreA Combined Watermarking and Encryption Algorithm for Secure VoIP
View moreSurvey on Nonrepudiation: Digital Signature Versus Biometrics
View moreCyberterrorism: Postmodern State of Chaos
View more
Comments