Default: International Journal of Security and its Applications

ISSN: 1738-9976

Journal Home

Journal Guideline

International Journal of Security and its Applications Q4 Unclaimed

Science and Engineering Research Support Society South Korea
Unfortunately this journal has not been claimed yet. For this reason, some information may be unavailable.

International Journal of Security and its Applications is a journal indexed in SJR in Computer Science (miscellaneous) with an H index of 20. It has a best quartile of Q4.

Type: Journal

Type of Copyright:

Languages:

Open Access Policy:

Type of publications:

Publication frecuency: -

Price

- €

Inmediate OA

NPD

Embargoed OA

- €

Non OA

Metrics

International Journal of Security and its Applications

-

SJR Impact factor

20

H Index

0

Total Docs (Last Year)

422

Total Docs (3 years)

0

Total Refs

192

Total Cites (3 years)

415

Citable Docs (3 years)

0

Cites/Doc (2 years)

0.0

Ref/Doc

Comments

No comments ... Be the first to comment!



Best articles by citations

Modeling and Analysis of SMER Constraints Violation in IRBAC 2000 Model Based on Colored Petri Nets

View more

A Reliable File Protection System Based on Transparent Encryption

View more

How to Formally Model Features of Network Security Protocols

View more

Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing

View more

Analysis on Fraud Detection for Internet Service

View more

An Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment

View more

Evading Anti-debugging Techniques with Binary Substitution

View more

Analysis on the Attribute Binding based Enhanced User Authentication

View more

Knowledge Based Secure Data Streaming in Virtual Environment

View more

Load Spectrum and Fatigue Life Computer Analysis of Prestressed Concrete Bridges

View more

Fault Diagnosis Research of Submarine Casing Cutting Robot for Abandoned Oil Wellhead

View more

Data Security Monitoring Platform in Cloud for Enterprise

View more
SHOW MORE ARTICLES

New Construction of Efficient Certificateless Aggregate Signatures

View more

New Construction of Even-variable Rotation Symmetric Boolean Functions with Optimum Algebraic Immunity

View more

A Research on Security Awareness and Countermeasures for the Single Server

View more

Dynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data

View more

Optimization of Face Recognition Algorithms for Smartphone Environment

View more

A Deformed Shape Detection Scheme Using Time Series Images

View more

A High Speed Block Cipher Algorithm

View more

Development of Information Security Contents for Learning Hacking Principles

View more

Security Assessment for Key Management in Mobile Ad Hoc Networks

View more

Steganography in Digital Images Using Maximum Difference of Neighboring Pixel Values

View more

Security Authentication Method of Terminal Trusted Access in Smart Grid

View more

Risk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features

View more

FAQS