ISSN: 1738-9976
Journal Home
Journal Guideline
International Journal of Security and its Applications Q4 Unclaimed
International Journal of Security and its Applications is a journal indexed in SJR in Computer Science (miscellaneous) with an H index of 20. It has a best quartile of Q4.
Type: Journal
Type of Copyright:
Languages:
Open Access Policy:
Type of publications:
Publication frecuency: -
- €
Inmediate OANPD
Embargoed OA- €
Non OAMetrics
-
SJR Impact factor20
H Index0
Total Docs (Last Year)422
Total Docs (3 years)0
Total Refs192
Total Cites (3 years)415
Citable Docs (3 years)0
Cites/Doc (2 years)0.0
Ref/DocOther journals with similar parameters
Optical Memory and Neural Networks (Information Optics) Q4
Computer Science Q4
International Game Theory Review Q4
ICIC Express Letters Q4
Scientific and Technical Information Processing Q4
Compare this journals
Aims and Scope
Best articles by citations
Modeling and Analysis of SMER Constraints Violation in IRBAC 2000 Model Based on Colored Petri Nets
View moreA Reliable File Protection System Based on Transparent Encryption
View moreHow to Formally Model Features of Network Security Protocols
View moreTowards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing
View moreAnalysis on Fraud Detection for Internet Service
View moreAn Effective Layered Load Balance Defensive Mechanism against DDoS Attacks in Cloud Computing Environment
View moreEvading Anti-debugging Techniques with Binary Substitution
View moreAnalysis on the Attribute Binding based Enhanced User Authentication
View moreKnowledge Based Secure Data Streaming in Virtual Environment
View moreLoad Spectrum and Fatigue Life Computer Analysis of Prestressed Concrete Bridges
View moreFault Diagnosis Research of Submarine Casing Cutting Robot for Abandoned Oil Wellhead
View moreData Security Monitoring Platform in Cloud for Enterprise
View moreNew Construction of Efficient Certificateless Aggregate Signatures
View moreNew Construction of Even-variable Rotation Symmetric Boolean Functions with Optimum Algebraic Immunity
View moreA Research on Security Awareness and Countermeasures for the Single Server
View moreDynamic Multi-keyword Top-k Ranked Search over Encrypted Cloud Data
View moreOptimization of Face Recognition Algorithms for Smartphone Environment
View moreA Deformed Shape Detection Scheme Using Time Series Images
View moreA High Speed Block Cipher Algorithm
View moreDevelopment of Information Security Contents for Learning Hacking Principles
View moreSecurity Assessment for Key Management in Mobile Ad Hoc Networks
View moreSteganography in Digital Images Using Maximum Difference of Neighboring Pixel Values
View moreSecurity Authentication Method of Terminal Trusted Access in Smart Grid
View moreRisk Prediction of Malicious Code-Infected Websites by Mining Vulnerability Features
View more
Comments