Default: Information Security Journal

ISSN: 1939-3555

Journal Home

Journal Guideline

Information Security Journal Q2 Unclaimed

Taylor and Francis Ltd. United Kingdom
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

Information Security Journal is a journal indexed in SJR in Software and Computer Science Applications with an H index of 32. It has a price of 2395 €. It has an SJR impact factor of 0,546 and it has a best quartile of Q2. It has an SJR impact factor of 0,546.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

2395 €

Inmediate OA

NPD

Embargoed OA

0 €

Non OA

Metrics

Information Security Journal

0,546

SJR Impact factor

32

H Index

37

Total Docs (Last Year)

93

Total Docs (3 years)

1886

Total Refs

310

Total Cites (3 years)

93

Citable Docs (3 years)

2.85

Cites/Doc (2 years)

50.97

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Conficker: Lessons in Secure Software and System Design

View more

An Authentication and Authorization Solution for a Multiplatform Cloud Environment

View more

On the Hardware Implementation Cost of Crypto-Processors Architectures

View more

Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing

View more

An Overview of Modern Botnets

View more

From the Editor's Desk

View more

Overview of Information Security Using Genetic Algorithm and Chaos

View more

From the Editor's Desk

View more

Investigating Information Security Awareness: Research and Practice Gaps

View more

A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia

View more

Enhanced Timeline Analysis for Digital Forensic Investigations

View more

Trust Ensuring Crisis Management Hardware Module

View more
SHOW MORE ARTICLES

Security and Control in the Cloud

View more

Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters

View more

Applying Security within a Service-Oriented Architecture

View more

Guest Editorial: Cryptographic Hardware-A Short, Practical Checklist

View more

A Forensic Mechanism to Trace the Master of Distributed Denial-of-Service Attack

View more

A survey of applications of threshold cryptography - proposed and practiced

View more

Information Security Awareness Status of Business College: Undergraduate Students

View more

Using Hash Table to Extract Real-Time Online Network Traffic Features for Hardware IDS

View more

Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring "Battle Readiness"

View more

A Combined Watermarking and Encryption Algorithm for Secure VoIP

View more

Survey on Nonrepudiation: Digital Signature Versus Biometrics

View more

Cyberterrorism: Postmodern State of Chaos

View more

FAQS