ISSN: 1353-4858
Journal Home
Journal Guideline
Network Security Q4 Unclaimed
Network Security is a trade journal indexed in SJR in Information Systems and Management and Computer Networks and Communications with an H index of 33. It has a price of 2040 €. It has an SJR impact factor of 0,139 and it has a best quartile of Q4. It is published in English. It has an SJR impact factor of 0,139.
Type: Trade journal
Type of Copyright:
Languages: English
Open Access Policy:
Type of publications:
Publication frecuency: -
2040 €
Inmediate OANPD
Embargoed OA0 €
Non OAMetrics
0,139
SJR Impact factor33
H Index28
Total Docs (Last Year)154
Total Docs (3 years)114
Total Refs63
Total Cites (3 years)154
Citable Docs (3 years)0.16
Cites/Doc (2 years)4.07
Ref/DocOther journals with similar parameters
Journal of Operations and Supply Chain Management Q4
ECTI Transactions on Computer and Information Technology Q4
International Journal of Networking and Virtual Organisations Q4
International Journal of Knowledge and Systems Science Q4
International Journal of Information and Decision Sciences Q4
Compare this journals
Aims and Scope
Best articles by citations
US Set To Improve Federal Websites, Establish CIO
View moreIntranet firewalls susceptible to internal attacks
View moreVirtual Private Network Security
View moreEmployees on the net
View morePoking at the Borders
View moreThe future of PGP on the Internet
View moreUser authentication: Options in Oracle
View moreAuditing Electronic Mail
View moreThe Internet threat
View moreInternet holes - Part 10: UDP viruses
View moreThe fortress mentality - Part IV: Telecomputing, telecommuting and serving remote customers
View moreThe communications decency Act and the karma of chaos - Part 1
View moreThe evolution of the Advanced Encryption Standard
View moreTake one large bomb
View moreWhat exactly is information warfare? - Part 1
View moreTime-Based Security
View moreHack of the Month
View morePhysical layer network security: What your LAN can do for you
View moreAnti-virus technology for Yahoo!
View moreUnix Vendors Vulnerable to Malicious Attacks
View moreThe future of the advanced encryption standard
View moreThe End Of The Internet As We Know It
View moreThe elliptic curve cryptosystem: A synopsis
View moreReview of the Year, Part II
View more
Comments