ISeCure-ISC International Journal of Information Security

Scope & Guideline

Unveiling Insights in the Evolving Landscape of Cybersecurity

Introduction

Explore the comprehensive scope of ISeCure-ISC International Journal of Information Security through our detailed guidelines, including its aims and scope. Stay updated with trending and emerging topics, and delve into declining areas to understand shifts in academic interest. Our guidelines also showcase highly cited topics, featuring influential research making a significant impact. Additionally, discover the latest published papers and those with high citation counts, offering a snapshot of current scholarly conversations. Use these guidelines to explore ISeCure-ISC International Journal of Information Security in depth and align your research initiatives with current academic trends.
LanguageEnglish
ISSN2008-2045
PublisherIRANIAN SOC CRYPTOLOGY
Support Open AccessNo
CountryIran
TypeJournal
Convergefrom 2019 to 2024
AbbreviationISECURE-ISC INT J IN / ISeCure-ISC Int. J. Inf. Secur.
Frequency2 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressDEPT COMPUTER ENGINEERING, SHARIF UNIV TECHNOLOGY, NO 9, SADEGHI ST, AZADI AVE, TEHRAN 00000, IRAN

Aims and Scopes

The ISeCure-ISC International Journal of Information Security focuses on advancing knowledge and research in the realm of information security. It encompasses a wide range of topics that reflect the evolving landscape of cybersecurity threats, defense mechanisms, and technological advancements.
  1. Cybersecurity Threats and Attacks:
    The journal addresses various forms of cybersecurity threats, including SQL injection attacks, ransomware, and side-channel attacks, providing insights into their detection and mitigation.
  2. Cryptography and Secure Communication:
    It explores innovative cryptographic techniques and protocols, including lightweight cryptographic algorithms, post-quantum cryptography, and identity-based encryption, aimed at enhancing secure communication.
  3. Machine Learning and AI in Security:
    A significant focus is on the application of machine learning and artificial intelligence, particularly in intrusion detection systems, vulnerability scanning, and attack detection mechanisms.
  4. Access Control and Privacy:
    The journal discusses advancements in access control mechanisms, privacy-preserving techniques, and secure data sharing, particularly in resource-constrained environments.
  5. Blockchain and Smart Contracts Security:
    It includes research on security aspects of blockchain technology, smart contracts, and decentralized applications, emphasizing the need for robust security measures.
  6. Cloud Security and Data Protection:
    The journal covers topics related to cloud computing security, including threats, vulnerabilities, and strategies for secure data sharing and management in cloud environments.
  7. Internet of Things (IoT) Security:
    Research on securing IoT devices and networks is a critical area, focusing on lightweight protocols and security measures suitable for resource-constrained IoT environments.
The journal has identified several trending and emerging themes that reflect the latest advancements and challenges in information security, showcasing the dynamic nature of this field.
  1. Artificial Intelligence and Machine Learning Applications:
    There is a notable increase in research leveraging AI and machine learning for cybersecurity applications, including intrusion detection, threat modeling, and vulnerability assessment.
  2. Post-Quantum Cryptography:
    With the rise of quantum computing threats, research on post-quantum cryptographic algorithms is gaining momentum, focusing on developing secure systems that can withstand quantum attacks.
  3. Secure Data Sharing in Cloud Environments:
    Emerging themes around secure data sharing mechanisms, especially in healthcare and IoT, are becoming increasingly important as organizations migrate to cloud-based solutions.
  4. Smart Contracts and Blockchain Security:
    Research focusing on the security of smart contracts and blockchain technologies is trending, driven by the growing adoption of decentralized applications and cryptocurrencies.
  5. Privacy-Preserving Techniques:
    The development of privacy-preserving protocols, especially in the context of federated learning and data sharing, is an emerging focus area as privacy concerns escalate.
  6. IoT and Cyber-Physical Systems Security:
    As IoT devices proliferate, research on securing these devices and the broader cyber-physical systems is an emerging theme, highlighting the need for lightweight and efficient security solutions.

Declining or Waning

While the journal maintains a broad spectrum of research topics, certain themes have shown a decline in prominence over recent years, indicating a potential shift in focus among researchers and practitioners.
  1. Traditional Network Security Protocols:
    There appears to be a waning interest in traditional network security protocols, as more focus shifts towards advanced techniques involving machine learning, AI, and adaptive security measures.
  2. Static Analysis Techniques:
    Static analysis methods for vulnerability detection are becoming less prominent compared to dynamic and semi-supervised approaches, which are seen as more effective in the current threat landscape.
  3. Legacy Cryptographic Schemes:
    Research on older cryptographic schemes and protocols is declining, as the field moves towards post-quantum cryptography and more innovative approaches that address modern security challenges.
  4. Conventional Web Application Security:
    The focus on conventional web application security measures, such as firewalls and standard encryption methods, is decreasing, with a growing emphasis on adaptive and AI-driven solutions.

Similar Journals

Journal of Computer Security

Fostering breakthroughs in secure computing practices.
Publisher: IOS PRESSISSN: 0926-227XFrequency: 6 issues/year

Welcome to the Journal of Computer Security, a premier publication dedicated to advancing the field of cybersecurity and digital safety. Published by IOS PRESS, this esteemed journal has been at the forefront of research since its inception, with a rich history spanning from 1992 to 2024. Based in the Netherlands, the journal aims to provide a reputable platform for researchers and professionals to disseminate innovative findings in various subfields, including computer networks, hardware architecture, and software engineering. With its current Q3 ranking across multiple categories and a focus on safety, risk, reliability, and quality, the journal plays a critical role in shaping contemporary discourse and fostering collaboration within the cybersecurity community. Though it is not an open-access journal, the Journal of Computer Security remains a vital resource for academics and practitioners alike, offering access to significant advancements and methodologies that guide the evolution of security practices worldwide. Engage with us and contribute to this dynamic field of study!

JOURNAL OF DATABASE MANAGEMENT

Exploring Innovations in Database Management
Publisher: IGI GLOBALISSN: 1063-8016Frequency: 4 issues/year

JOURNAL OF DATABASE MANAGEMENT, published by IGI GLOBAL, stands at the forefront of research in the fields of Information Systems, Hardware and Architecture, and Software, making it an essential resource for researchers, professionals, and students alike. With an ISSN of 1063-8016 and an E-ISSN of 1533-8010, the journal has established a significant impact in its domain, achieving a Q2 ranking in Information Systems and Q3 in both Hardware and Architecture and Software as of 2023. This reflects its commitment to disseminating high-quality research and developments within the evolving landscape of database management. The journal, which spans a wide array of topics from theoretical frameworks to practical applications, encourages contributions that not only advance academic discourse but also address real-world challenges. Although not open access, its rigorous peer-review process ensures the publication of impactful and credible content. With converged years from 2003 to 2024, it continues to provide a robust platform for scholarly communication, facilitating the exchange of innovative ideas and fostering academic growth in a critical area of computer science.

International Journal of Information Security

Innovating Solutions for a Safer Digital World.
Publisher: SPRINGERISSN: 1615-5262Frequency: 6 issues/year

The International Journal of Information Security, published by Springer, stands as a premier platform for research in the rapidly evolving field of information security. Operating under ISSN 1615-5262 and E-ISSN 1615-5270, this journal has established a significant academic presence since its inception in 2005. With a commendable 2023 impact factor ranking, it holds a distinguished position in various categories, including Q1 in Information Systems and Safety, Risk, Reliability and Quality, and Q2 in Computer Networks and Communications and Software. This reflects the journal's commitment to publishing high-quality, peer-reviewed articles that advance both theoretical and practical aspects of information security. Researchers and professionals alike will find invaluable insights regarding the latest developments, methodologies, and trends in the field, making it an essential resource for staying current with contemporary challenges and solutions. By fostering a cross-disciplinary dialogue among security specialists, system engineers, and risk managers from around the globe, the journal not only enhances the academic discourse but also contributes to the practical application of findings in the industry.

Cluster Computing-The Journal of Networks Software Tools and Applications

Navigating the Future of Cluster Computing Together
Publisher: SPRINGERISSN: 1386-7857Frequency: 4 issues/year

Cluster Computing - The Journal of Networks Software Tools and Applications, published by Springer, is a premier academic journal catering to the vibrant fields of computer networks and software technologies. With an impressive impact factor and recognized as a Q1 journal in both Computer Networks and Communications and Software categories for 2023, it ranks within the top echelons of its field, boasting a Scopus rank of #50 out of 395 and #59 out of 407 respectively, highlighting its influence and reach. The journal, which has been in continuous publication since 2005, serves as a vital platform for groundbreaking research, offering insightful articles and tools that drive innovation in network computing. Researchers, professionals, and students are invited to contribute to and benefit from the dynamic discourse presented in this journal, which is pivotal for advancing knowledge and enhancing practical applications in a rapidly evolving technological landscape.

Journal of Computer Virology and Hacking Techniques

Advancing Knowledge in Computer Virality and Hacking Techniques
Publisher: SPRINGER FRANCEISSN: 2263-8733Frequency: 4 issues/year

Welcome to the Journal of Computer Virology and Hacking Techniques, a prestigious academic publication dedicated to the evolving fields of cybersecurity and digital threats. Published by Springer France, this open-access journal has been at the forefront of disseminating high-quality research since its inception in 2014. With an increasing impact in areas such as computational theory, hardware architecture, and software security, the journal holds a significant position, classified in the Q2 and Q3 quartiles across several categories in 2023. The journal aims to provide a platform for researchers, professionals, and students to explore the latest advances in combatting cyber vulnerabilities and understanding hacking techniques. In alignment with its open-access policy, the journal ensures that knowledge is readily available to a global audience, reinforcing its mission to enhance the scholarly discourse surrounding computer virality while adhering to rigorous academic standards.

International Journal of Electronic Security and Digital Forensics

Unveiling the future of digital forensics and security.
Publisher: INDERSCIENCE ENTERPRISES LTDISSN: 1751-911XFrequency: 4 issues/year

The International Journal of Electronic Security and Digital Forensics, published by INDERSCIENCE ENTERPRISES LTD, is a leading platform for disseminating scholarly research in the realms of cybersecurity, digital forensics, and electronic security. Established with the objective of bridging the gap between theoretical advancements and practical applications, the journal spans critical areas such as network security, legal implications of digital forensics, and reliability in safety measures. With its ISSN 1751-911X and E-ISSN 1751-9128, the journal aims to provide valuable insights into emerging technologies and methodologies while maintaining high academic standards, as reflected in its diverse quartile rankings across multiple categories in 2023. Operating from the United Kingdom and catering to a global audience, the journal is committed to fostering innovative research that contributes to safer digital environments. Researchers, professionals, and students will find a wealth of information and opportunities for collaboration in this specialized field, making International Journal of Electronic Security and Digital Forensics an essential resource for advancing knowledge and practice.

Journal of Cryptographic Engineering

Elevating the standards of research in cryptography and information security.
Publisher: SPRINGER HEIDELBERGISSN: 2190-8508Frequency: 4 issues/year

The Journal of Cryptographic Engineering, published by Springer Heidelberg, is a prominent platform dedicated to advancing the field of cryptography and its applications in secure communication and information security technologies. With the ISSN 2190-8508 and E-ISSN 2190-8516, this journal showcases rigorous and innovative research contributions from 2011 to 2024, reflecting its commitment to excellence in academic publishing. Recognized among the Q2 category in Computer Networks and Communications and Software, it ranks impressively within the Scopus framework, securing positions in the 59th and 54th percentiles respectively. The Journal aims to facilitate a comprehensive understanding of cryptographic techniques, promote collaboration among researchers, and provide a vital resource for students and professionals. By maintaining high standards of peer review and providing a platform for cutting-edge research, it plays a crucial role in shaping the future of cryptographic engineering.

Journal of Information Security and Applications

Pioneering Research for a Secure Digital Future
Publisher: ELSEVIERISSN: 2214-2126Frequency: 6 issues/year

Journal of Information Security and Applications, published by ELSEVIER, is a premier outlet for cutting-edge research in the field of information security and applications. With a dedicated ISSN of 2214-2126 and an E-ISSN of 2214-2134, this journal ranks impressively in the top quartile (Q1) across multiple categories as of 2023, including Computer Networks and Communications, Safety, Risk, Reliability and Quality, and Software. The journal’s notable Scopus rankings further reflect its impact, holding positions within the top 15% in several engineering and computer science areas. Spanning a converged period from 2013 to 2024, the journal aims to disseminate high-quality research findings, facilitating a vibrant platform for scholars, practitioners, and students to engage with contemporary challenges in information security. Although not an open-access journal, the knowledge shared within its pages is indispensable for those dedicated to advancing the technological and theoretical underpinnings of security measures in various applications.

International Arab Journal of Information Technology

Elevating Arab Research in Global IT Discourses
Publisher: ZARKA PRIVATE UNIVISSN: 1683-3198Frequency: 6 issues/year

Welcome to the International Arab Journal of Information Technology, a prestigious publication under the aegis of ZARKA PRIVATE UNIVERSITY in Jordan, dedicated to advancing the field of Information Technology. First established in 2008, this journal has made significant strides in disseminating high-quality research, achieving an impressive Q2 ranking in Computer Science (miscellaneous) and securing a notable 57th percentile position in the Scopus rankings. With a comprehensive scope encompassing various sub-disciplines of computer science, the journal is committed to promoting scholarly dialogue and innovation among researchers, professionals, and students. While currently operating as a subscription-only journal, it remains a vital resource for the academic community seeking to explore the latest trends and advancements in technology. The International Arab Journal of Information Technology is not only a platform for original research but also a vibrant hub for ideas that shape the technological landscape of the Arab region and beyond.

Cryptography

Elevating Standards in Cryptographic Research
Publisher: MDPIISSN: Frequency: 4 issues/year

Cryptography, an esteemed journal published by MDPI, focuses on the rapidly evolving fields of cryptography and information security, providing a platform for researchers and practitioners to share their findings and advancements. Since its inception in 2017, it has embraced an Open Access model, allowing unrestricted access to high-quality research articles, thereby fostering collaboration and innovation among academics globally. Based in Switzerland, this journal aims to cover a broad spectrum, from theoretical foundations to practical applications, contributing significantly to fields such as Applied Mathematics and Computer Science. Its impressive rankings in reputable databases like Scopus reflect its relevance and quality, holding a Q2 category in multiple disciplines, including Computational Theory and Mathematics and Computer Networks and Communications. With the continuous rise in importance of cybersecurity and data protection, Cryptography serves as a vital resource for professionals, students, and researchers dedicated to advancing knowledge in these critical areas.