Journal of Information Security and Applications

Scope & Guideline

Pioneering Research for a Secure Digital Future

Introduction

Immerse yourself in the scholarly insights of Journal of Information Security and Applications with our comprehensive guidelines detailing its aims and scope. This page is your resource for understanding the journal's thematic priorities. Stay abreast of trending topics currently drawing significant attention and explore declining topics for a full picture of evolving interests. Our selection of highly cited topics and recent high-impact papers is curated within these guidelines to enhance your research impact.
LanguageEnglish
ISSN2214-2126
PublisherELSEVIER
Support Open AccessNo
CountryUnited Kingdom
TypeJournal
Convergefrom 2013 to 2024
AbbreviationJ INF SECUR APPL / J. Inf. Secur. Appl.
Frequency6 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressRADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS

Aims and Scopes

The Journal of Information Security and Applications primarily focuses on advancing the field of information security through innovative research contributions that encompass a variety of areas related to cybersecurity, cryptography, privacy, and data protection. The journal aims to provide a platform for researchers and practitioners to share their findings, methodologies, and practical approaches to address the evolving challenges in information security.
  1. Cryptography and Secure Communication:
    Research related to cryptographic algorithms, protocols, and systems designed to secure communication channels. This includes advancements in encryption techniques, digital signatures, and secure messaging.
  2. Privacy and Data Protection:
    Studies focused on privacy-preserving techniques, data anonymization, and protection mechanisms that ensure user privacy in various applications, particularly in cloud computing and IoT environments.
  3. Malware Detection and Prevention:
    Innovations in detecting and mitigating malware threats, including the use of machine learning, deep learning, and behavioral analysis to identify malicious activities in software and networks.
  4. Access Control and Authentication:
    Research on methods and frameworks for secure access control, authentication schemes, and identity management, particularly in decentralized and cloud-based systems.
  5. Intrusion Detection and Response:
    Development of systems and methodologies for detecting intrusions and responding to security breaches in real-time, utilizing techniques from artificial intelligence and machine learning.
  6. Blockchain and Distributed Ledger Technologies:
    Exploration of blockchain applications, including secure transactions, smart contracts, and the integration of blockchain with other security paradigms for enhanced data integrity and transparency.
  7. Security in Emerging Technologies:
    Investigations into security challenges and solutions within emerging technologies such as IoT, 5G networks, and AI, focusing on their unique vulnerabilities and protective measures.
Recent publications in the Journal of Information Security and Applications indicate a shift towards more advanced and specialized topics within the field of information security. The emerging themes reflect current challenges and innovations in technology and security practices.
  1. Homomorphic Encryption and Privacy-Preserving Computation:
    There is a growing interest in homomorphic encryption and techniques that allow computations on encrypted data without decrypting it, which is crucial for secure data sharing in cloud environments.
  2. AI and Machine Learning for Security:
    The integration of artificial intelligence and machine learning in security applications is trending, with research focusing on automated threat detection, adaptive security measures, and predictive analytics.
  3. Federated Learning and Decentralized Models:
    Research on federated learning, which allows for collaborative model training without sharing raw data, is gaining traction, particularly for privacy-sensitive applications in healthcare and finance.
  4. Quantum-Safe Cryptography:
    As quantum computing poses a potential threat to classical cryptographic systems, there is an emerging focus on developing quantum-resistant algorithms to ensure long-term security.
  5. Data Integrity and Provenance:
    Studies addressing data integrity and provenance management, particularly in blockchain applications, are on the rise, reflecting the need for reliable tracking of data origins and modifications.
  6. Secure IoT Architectures:
    Research into secure architectures for IoT devices and networks is expanding, emphasizing the need for robust security measures to protect against the unique vulnerabilities of interconnected devices.

Declining or Waning

As the field of information security evolves, certain research areas appear to be declining in prominence within the Journal of Information Security and Applications. This decline may reflect shifts in technological focus, changing threat landscapes, or the maturation of specific security practices.
  1. Traditional Network Security:
    Research focused on traditional network security measures, such as firewalls and basic intrusion detection systems, is becoming less prevalent as more advanced, adaptive systems are being developed.
  2. Static Malware Analysis:
    The emphasis on static analysis techniques for malware detection is waning, as dynamic analysis and behavioral detection methods gain favor due to their effectiveness in dealing with sophisticated malware.
  3. Basic Encryption Techniques:
    There is a noticeable decrease in papers discussing basic encryption algorithms, with a shift towards more complex and innovative cryptographic approaches such as homomorphic encryption and quantum-resistant algorithms.
  4. Legacy Systems Security:
    Research dedicated to securing legacy systems is diminishing, likely due to the increasing adoption of modern architectures and the associated security practices that address contemporary threats.
  5. Single-Factor Authentication:
    The focus on single-factor authentication approaches is declining as multi-factor authentication methods become the standard for enhancing security in various applications.

Similar Journals

International Journal of Electronic Security and Digital Forensics

Exploring innovative solutions for a safer digital world.
Publisher: INDERSCIENCE ENTERPRISES LTDISSN: 1751-911XFrequency: 4 issues/year

The International Journal of Electronic Security and Digital Forensics, published by INDERSCIENCE ENTERPRISES LTD, is a leading platform for disseminating scholarly research in the realms of cybersecurity, digital forensics, and electronic security. Established with the objective of bridging the gap between theoretical advancements and practical applications, the journal spans critical areas such as network security, legal implications of digital forensics, and reliability in safety measures. With its ISSN 1751-911X and E-ISSN 1751-9128, the journal aims to provide valuable insights into emerging technologies and methodologies while maintaining high academic standards, as reflected in its diverse quartile rankings across multiple categories in 2023. Operating from the United Kingdom and catering to a global audience, the journal is committed to fostering innovative research that contributes to safer digital environments. Researchers, professionals, and students will find a wealth of information and opportunities for collaboration in this specialized field, making International Journal of Electronic Security and Digital Forensics an essential resource for advancing knowledge and practice.

Journal of Information Assurance and Security

Upholding Privacy Through Groundbreaking Studies.
Publisher: DYNAMIC PUBLISHERS, INCISSN: 1554-1010Frequency: 6 issues/year

Journal of Information Assurance and Security, an esteemed publication by DYNAMIC PUBLISHERS, INC, serves as a pivotal platform for the dissemination of innovative research and insights in the field of information security and assurance. With its ISSN 1554-1010 and E-ISSN 1554-1029, this journal addresses critical vulnerabilities, emerging technologies, and methodologies that fortify data integrity and uphold privacy in our increasingly digital world. Although specific metrics such as the HIndex and Scopus ranks are currently unavailable, the journal is recognized for its contributions to both academia and industry, fostering collaboration among researchers, professionals, and students dedicated to advancing security protocols. The journal does not currently offer open access but ensures comprehensive accessibility through institutional subscriptions. As cybersecurity continues to be a paramount concern globally, the Journal of Information Assurance and Security stands out as an essential resource for groundbreaking studies and practical applications that drive the future of information protection.

JOURNAL OF CRYPTOLOGY

Advancing Knowledge in Cryptology and Cybersecurity
Publisher: SPRINGERISSN: 0933-2790Frequency: 1 issue/year

JOURNAL OF CRYPTOLOGY, published by SPRINGER, stands at the forefront of research in the domains of applied mathematics, computer science applications, and software security. With a history of significant contributions since its inception in 1988, this esteemed journal encompasses a broad range of topics in cryptology, including but not limited to encryption, security protocols, and information security systems. Holding a prestigious Q1 classification in multiple fields, it ranks #45 out of 635 in Applied Mathematics and has esteemed positions in Computer Science categories, reflecting its influence and recognition in the academic community, as evidenced by its high percentiles. As a vital resource for researchers, professionals, and students, the JOURNAL OF CRYPTOLOGY not only aims to disseminate innovative findings and methodologies but also fosters an engaging discourse within the cryptology and cybersecurity realms. Notably, it offers access through traditional subscription models, ensuring that readers benefit from a rigorous selection of high-impact research articles. Explore groundbreaking advancements and contribute to the ongoing dialogue in this pivotal field through your engagement with our journal.

International Journal of Web Services Research

Empowering Knowledge Sharing in Web Services
Publisher: IGI GLOBALISSN: 1545-7362Frequency: 1 issue/year

The International Journal of Web Services Research, published by IGI Global, is a premier forum dedicated to advancing research and innovation in the field of web services. With an ISSN of 1545-7362 and an E-ISSN of 1546-5004, this journal has steadily contributed to the discourse on computer networks, information systems, and software development since its inception in 2004. Based in the United States, the journal publishes high-quality research articles that delve into cutting-edge web service technologies and methodologies, making it an invaluable resource for researchers, professionals, and students alike. Although categorized in the Q4 quartile in 2023 across several classifications, its growing impact and relevance are reflected in its ongoing engagement with contemporary issues in the web services landscape. As an academic platform, it aims to provide a comprehensive understanding of the dynamics of web services and their implications for future technological advancements. Researchers are encouraged to contribute their findings to foster knowledge sharing and collaboration within this vital domain.

International Journal of Information Security

Fostering Global Dialogue on Security Challenges.
Publisher: SPRINGERISSN: 1615-5262Frequency: 6 issues/year

The International Journal of Information Security, published by Springer, stands as a premier platform for research in the rapidly evolving field of information security. Operating under ISSN 1615-5262 and E-ISSN 1615-5270, this journal has established a significant academic presence since its inception in 2005. With a commendable 2023 impact factor ranking, it holds a distinguished position in various categories, including Q1 in Information Systems and Safety, Risk, Reliability and Quality, and Q2 in Computer Networks and Communications and Software. This reflects the journal's commitment to publishing high-quality, peer-reviewed articles that advance both theoretical and practical aspects of information security. Researchers and professionals alike will find invaluable insights regarding the latest developments, methodologies, and trends in the field, making it an essential resource for staying current with contemporary challenges and solutions. By fostering a cross-disciplinary dialogue among security specialists, system engineers, and risk managers from around the globe, the journal not only enhances the academic discourse but also contributes to the practical application of findings in the industry.

International Journal on Information Technologies and Security

Bridging Disciplines in Tech and Security
Publisher: UNION SCIENTISTS BULGARIAISSN: 1313-8251Frequency: 4 issues/year

International Journal on Information Technologies and Security, published by UNION SCIENTISTS BULGARIA, is a pivotal interdisciplinary journal that explores the rapidly evolving fields of information technology and security. With a robust ISSN of 1313-8251, this journal serves as a platform for researchers, professionals, and students to disseminate their findings and innovations in cybersecurity, data protection, and IT system integrity. The journal's commitment to open access enhances accessibility, ensuring that pivotal research reaches a broader audience, encouraging collaboration and advancement in these critical areas. As an invaluable resource for those engaged in the study and application of information security measures, the International Journal on Information Technologies and Security plays an essential role in shaping the discourse and driving forward the knowledge necessary to tackle today’s technological challenges.

ISeCure-ISC International Journal of Information Security

Driving Excellence in Information Security Scholarship
Publisher: IRANIAN SOC CRYPTOLOGYISSN: 2008-2045Frequency: 2 issues/year

ISeCure-ISC International Journal of Information Security, published by the Iranian Society of Cryptology, is a vital open-access platform dedicated to advancing the field of information security. Since its inception in 2009, the journal has strived to disseminate high-quality, peer-reviewed research that addresses contemporary challenges in information security, cryptography, and related computational disciplines. With an ISSN of 2008-2045 and an E-ISSN of 2008-3076, it has gained visibility in the academic community, evidenced by its Quartile 4 ranking across multiple categories such as Applied Mathematics, Computational Theory, and Information Systems. This journal aims to foster innovative solutions and theoretical advancements, targeting researchers, professionals, and students who seek to contribute to and learn from the latest developments in the field. By providing a venue for explorative and empirical research, ISeCure-ISC holds an important position in promoting knowledge and collaborative efforts within the global information security landscape.

Journal of Computer Virology and Hacking Techniques

Advancing Knowledge in Computer Virality and Hacking Techniques
Publisher: SPRINGER FRANCEISSN: 2263-8733Frequency: 4 issues/year

Welcome to the Journal of Computer Virology and Hacking Techniques, a prestigious academic publication dedicated to the evolving fields of cybersecurity and digital threats. Published by Springer France, this open-access journal has been at the forefront of disseminating high-quality research since its inception in 2014. With an increasing impact in areas such as computational theory, hardware architecture, and software security, the journal holds a significant position, classified in the Q2 and Q3 quartiles across several categories in 2023. The journal aims to provide a platform for researchers, professionals, and students to explore the latest advances in combatting cyber vulnerabilities and understanding hacking techniques. In alignment with its open-access policy, the journal ensures that knowledge is readily available to a global audience, reinforcing its mission to enhance the scholarly discourse surrounding computer virality while adhering to rigorous academic standards.

EURASIP Journal on Information Security

Navigating the complexities of information protection.
Publisher: SPRINGER INT PUBL AGISSN: 2510-523XFrequency: 1 issue/year

EURASIP Journal on Information Security, published by Springer International Publishing AG, is a premier open access journal dedicated to the rapid dissemination of research findings in the field of information security. With an ISSN of 2510-523X and a strong reputation reflected in its 2023 quartile rankings—Q1 in Computer Science Applications and Q2 in Signal Processing—this journal serves as a critical platform for researchers, professionals, and students alike to explore cutting-edge advancements in security technologies and methodologies. Established in 2007 as an open access journal, it promotes accessibility and encourages collaboration among the global scientific community. The journal's objectives include fostering innovative research that addresses the complex challenges of information security in today's digital landscape. With its base in the United Kingdom, EURASIP Journal on Information Security is committed to contributing to the evolution of security practices, ensuring that its audience stays at the forefront of the discipline.

Cluster Computing-The Journal of Networks Software Tools and Applications

Connecting Ideas, Driving Applications in Computing
Publisher: SPRINGERISSN: 1386-7857Frequency: 4 issues/year

Cluster Computing - The Journal of Networks Software Tools and Applications, published by Springer, is a premier academic journal catering to the vibrant fields of computer networks and software technologies. With an impressive impact factor and recognized as a Q1 journal in both Computer Networks and Communications and Software categories for 2023, it ranks within the top echelons of its field, boasting a Scopus rank of #50 out of 395 and #59 out of 407 respectively, highlighting its influence and reach. The journal, which has been in continuous publication since 2005, serves as a vital platform for groundbreaking research, offering insightful articles and tools that drive innovation in network computing. Researchers, professionals, and students are invited to contribute to and benefit from the dynamic discourse presented in this journal, which is pivotal for advancing knowledge and enhancing practical applications in a rapidly evolving technological landscape.