Journal of Information Security and Applications

Scope & Guideline

Transforming Knowledge into Secure Solutions

Introduction

Welcome to your portal for understanding Journal of Information Security and Applications, featuring guidelines for its aims and scope. Our guidelines cover trending and emerging topics, identifying the forefront of research. Additionally, we track declining topics, offering insights into areas experiencing reduced scholarly attention. Key highlights include highly cited topics and recently published papers, curated within these guidelines to assist you in navigating influential academic dialogues.
LanguageEnglish
ISSN2214-2126
PublisherELSEVIER
Support Open AccessNo
CountryUnited Kingdom
TypeJournal
Convergefrom 2013 to 2024
AbbreviationJ INF SECUR APPL / J. Inf. Secur. Appl.
Frequency6 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressRADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS

Aims and Scopes

The Journal of Information Security and Applications primarily focuses on advancing the field of information security through innovative research contributions that encompass a variety of areas related to cybersecurity, cryptography, privacy, and data protection. The journal aims to provide a platform for researchers and practitioners to share their findings, methodologies, and practical approaches to address the evolving challenges in information security.
  1. Cryptography and Secure Communication:
    Research related to cryptographic algorithms, protocols, and systems designed to secure communication channels. This includes advancements in encryption techniques, digital signatures, and secure messaging.
  2. Privacy and Data Protection:
    Studies focused on privacy-preserving techniques, data anonymization, and protection mechanisms that ensure user privacy in various applications, particularly in cloud computing and IoT environments.
  3. Malware Detection and Prevention:
    Innovations in detecting and mitigating malware threats, including the use of machine learning, deep learning, and behavioral analysis to identify malicious activities in software and networks.
  4. Access Control and Authentication:
    Research on methods and frameworks for secure access control, authentication schemes, and identity management, particularly in decentralized and cloud-based systems.
  5. Intrusion Detection and Response:
    Development of systems and methodologies for detecting intrusions and responding to security breaches in real-time, utilizing techniques from artificial intelligence and machine learning.
  6. Blockchain and Distributed Ledger Technologies:
    Exploration of blockchain applications, including secure transactions, smart contracts, and the integration of blockchain with other security paradigms for enhanced data integrity and transparency.
  7. Security in Emerging Technologies:
    Investigations into security challenges and solutions within emerging technologies such as IoT, 5G networks, and AI, focusing on their unique vulnerabilities and protective measures.
Recent publications in the Journal of Information Security and Applications indicate a shift towards more advanced and specialized topics within the field of information security. The emerging themes reflect current challenges and innovations in technology and security practices.
  1. Homomorphic Encryption and Privacy-Preserving Computation:
    There is a growing interest in homomorphic encryption and techniques that allow computations on encrypted data without decrypting it, which is crucial for secure data sharing in cloud environments.
  2. AI and Machine Learning for Security:
    The integration of artificial intelligence and machine learning in security applications is trending, with research focusing on automated threat detection, adaptive security measures, and predictive analytics.
  3. Federated Learning and Decentralized Models:
    Research on federated learning, which allows for collaborative model training without sharing raw data, is gaining traction, particularly for privacy-sensitive applications in healthcare and finance.
  4. Quantum-Safe Cryptography:
    As quantum computing poses a potential threat to classical cryptographic systems, there is an emerging focus on developing quantum-resistant algorithms to ensure long-term security.
  5. Data Integrity and Provenance:
    Studies addressing data integrity and provenance management, particularly in blockchain applications, are on the rise, reflecting the need for reliable tracking of data origins and modifications.
  6. Secure IoT Architectures:
    Research into secure architectures for IoT devices and networks is expanding, emphasizing the need for robust security measures to protect against the unique vulnerabilities of interconnected devices.

Declining or Waning

As the field of information security evolves, certain research areas appear to be declining in prominence within the Journal of Information Security and Applications. This decline may reflect shifts in technological focus, changing threat landscapes, or the maturation of specific security practices.
  1. Traditional Network Security:
    Research focused on traditional network security measures, such as firewalls and basic intrusion detection systems, is becoming less prevalent as more advanced, adaptive systems are being developed.
  2. Static Malware Analysis:
    The emphasis on static analysis techniques for malware detection is waning, as dynamic analysis and behavioral detection methods gain favor due to their effectiveness in dealing with sophisticated malware.
  3. Basic Encryption Techniques:
    There is a noticeable decrease in papers discussing basic encryption algorithms, with a shift towards more complex and innovative cryptographic approaches such as homomorphic encryption and quantum-resistant algorithms.
  4. Legacy Systems Security:
    Research dedicated to securing legacy systems is diminishing, likely due to the increasing adoption of modern architectures and the associated security practices that address contemporary threats.
  5. Single-Factor Authentication:
    The focus on single-factor authentication approaches is declining as multi-factor authentication methods become the standard for enhancing security in various applications.

Similar Journals

JOURNAL OF DATABASE MANAGEMENT

Exploring Innovations in Database Management
Publisher: IGI GLOBALISSN: 1063-8016Frequency: 4 issues/year

JOURNAL OF DATABASE MANAGEMENT, published by IGI GLOBAL, stands at the forefront of research in the fields of Information Systems, Hardware and Architecture, and Software, making it an essential resource for researchers, professionals, and students alike. With an ISSN of 1063-8016 and an E-ISSN of 1533-8010, the journal has established a significant impact in its domain, achieving a Q2 ranking in Information Systems and Q3 in both Hardware and Architecture and Software as of 2023. This reflects its commitment to disseminating high-quality research and developments within the evolving landscape of database management. The journal, which spans a wide array of topics from theoretical frameworks to practical applications, encourages contributions that not only advance academic discourse but also address real-world challenges. Although not open access, its rigorous peer-review process ensures the publication of impactful and credible content. With converged years from 2003 to 2024, it continues to provide a robust platform for scholarly communication, facilitating the exchange of innovative ideas and fostering academic growth in a critical area of computer science.

Internet Technology Letters

Exploring Innovations in Digital Connectivity.
Publisher: JOHN WILEY & SONS LTDISSN: Frequency: 6 issues/year

Internet Technology Letters, published by John Wiley & Sons Ltd, is a dynamic and rapidly evolving journal that focuses on the innovative applications and developments within the realms of Artificial Intelligence, Computer Networks and Communications, Information Systems, and Software. With its E-ISSN 2476-1508 and a defined convergence period from 2018 to 2024, this journal seeks to address emerging trends and critical challenges confronting the digital landscape today. Recognized in the Q3 quartile range across multiple computer science categories in 2023, it serves as a valuable resource for researchers, professionals, and students seeking to advance their knowledge and stay updated on significant technological advancements. While currently not an open-access journal, Internet Technology Letters holds a prominent position on platforms like Scopus, ranked within the middle percentiles, reflecting its contribution to the academic community. The journal aims to foster connectivity between academia and industry, encouraging submissions that promote interdisciplinary collaboration and innovation. By creating a platform for sharing groundbreaking research, Internet Technology Letters plays a crucial role in shaping future technological landscapes.

ACM Transactions on Privacy and Security

Empowering Innovations in Privacy and Security.
Publisher: ASSOC COMPUTING MACHINERYISSN: 2471-2566Frequency: 4 issues/year

ACM Transactions on Privacy and Security, published by the Association for Computing Machinery, is a prestigious journal dedicated to the field of computer science, with a particular focus on privacy and security in modern computing environments. Since its inception in 2016, this journal has become a vital resource for researchers, professionals, and students alike, addressing the increasing concerns surrounding data protection and risk management. With an impressive impact factor and recognition as a Q1 journal in both Computer Science (Miscellaneous) and Safety, Risk, Reliability and Quality, it ranks among the top publications in its field, positioned at the 73rd percentile in General Computer Science and the 71st percentile in Engineering. The journal’s Open Access options enhance accessibility to cutting-edge research, fostering collaboration and innovation in the rapidly evolving landscape of privacy and security. Readers can expect high-quality peer-reviewed articles that contribute significantly to both theoretical and practical advancements in technology and data security.

Jordanian Journal of Computers and Information Technology

Unveiling New Horizons in Information Systems
Publisher: Princess Sumaya Univ & SRSFISSN: 2413-9351Frequency: 4 issues/year

Jordanian Journal of Computers and Information Technology, published by Princess Sumaya University and SRSF, stands as a significant platform for scholarly research in the realm of computer science, particularly in topics related to emerging technologies and information systems. With its Open Access model initiated in 2015, the journal facilitates global access to high-quality research findings, embodying the principles of knowledge sharing and academic collaboration. The journal's ranking in the Q3 category of Computer Science (miscellaneous) and its placement in the 54th percentile of Scopus' General Computer Science rankings underscore its growing reputation among researchers and professionals alike. Situated in Amman, Jordan, the journal actively contributes to the regional and international discourse on computing methodologies, applications, and innovations, making it an indispensable resource for scholars seeking to advance their understanding and engage with contemporary issues in technology.

Annals of Telecommunications

Exploring groundbreaking technologies in telecommunications.
Publisher: SPRINGER INT PUBL AGISSN: 0003-4347Frequency: 6 issues/year

Annals of Telecommunications is a prestigious peer-reviewed journal published by SPRINGER INT PUBL AG, dedicated to advancing the field of electrical and electronic engineering. Established in 1946, this journal presents a comprehensive collection of research articles that address the latest trends and developments in telecommunications, including innovative technologies, systems, and applications. With an impressive Q2 ranking in the 2023 category of Electrical and Electronic Engineering and a Scopus rank in the 68th percentile, the journal serves as a vital platform for researchers, professionals, and students looking to disseminate groundbreaking findings and engage with contemporary challenges in the field. Although it is not an Open Access journal, it offers a wealth of knowledge that contributes to both academic and practical advancements in telecommunications. The Annals of Telecommunications remains an essential resource for anyone involved in telecommunication research and practice, fostering collaboration and knowledge exchange globally.

COMPUTERS & SECURITY

Leading the charge in cutting-edge cybersecurity research.
Publisher: ELSEVIER ADVANCED TECHNOLOGYISSN: 0167-4048Frequency: 8 issues/year

COMPUTERS & SECURITY is a leading international journal published by Elsevier Advanced Technology, dedicated to advancing the interdisciplinary field of cybersecurity. With an impact factor reflecting its prestige, this journal holds a remarkable Q1 ranking in both Computer Science and Law categories according to the 2023 rankings. Since its inception in 1982, it has provided a platform for high-quality research that addresses key challenges in computer security, cyber law, and technology policy, and aims to evolve as the digital landscape continues to transform. Researchers and professionals seeking to contribute to vital discussions about security vulnerabilities, threat mitigation, and legal frameworks will find this journal an invaluable resource. Although it is not open access, the journal maintains a robust presence in the scholarly community, with exceptional rankings in Scopus—#7 in Social Sciences (Law) and #18 in General Computer Science, both highlighting its critical role in shaping knowledge and practice in these fields.

Information Security Journal

Elevating Standards in Computer Science Applications.
Publisher: TAYLOR & FRANCIS INCISSN: 1939-3555Frequency: 6 issues/year

The Information Security Journal, published by Taylor & Francis Inc, is a pioneering platform dedicated to disseminating knowledge in the realms of information security, computer science applications, and information systems management. With an ISSN of 1939-3555 and an E-ISSN of 1939-3547, this journal has successfully carved its niche within the Q2 quartile of the 2023 rankings for both Computer Science Applications and Information Systems and Management, while also being recognized in Q3 for the Software category. Located in the United Kingdom, the journal has been committed to advancing research and fostering innovation from 2008 through 2024, making it an essential resource for academics and professionals alike. With a significant Scopus ranking in its fields—placing 43rd out of 148 in Decision Sciences and 271st out of 817 in Computer Science Applications—the journal stands as a vital source of interdisciplinary insights. Although it does not currently offer open access options, the quality of publications and the journal's dedication to the field ensure that it remains a compelling choice for researchers seeking to publish their findings or stay abreast of current developments in information security.

Cybersecurity

Shaping Policies and Technologies for a Safer Cyber Landscape
Publisher: SPRINGERNATUREISSN: 2523-3246Frequency: 1 issue/year

Cybersecurity, published by SpringerNature, serves as a pivotal platform in the realms of Artificial Intelligence, Information Systems, Software, and Computer Networks and Communications. With an impressive Impact Factor and an Open Access model initiated in 2018, this journal facilitates widespread dissemination of innovative research findings to a global audience. Based in the United Kingdom, Cybersecurity aims to advance knowledge and application in security innovations, risk management, and system resilience against cyber threats. The journal's current standing is prominently reflected in its Q1 and Q2 ratings across various computer science categories, indicating its reputable contribution to the academic community. By continuously publishing cutting-edge research, Cybersecurity plays a crucial role in informing policy decisions, advancing technology, and enhancing the collective understanding of cyber resilience, making it an essential resource for researchers, professionals, and students alike.

Journal of Cryptographic Engineering

Elevating the standards of research in cryptography and information security.
Publisher: SPRINGER HEIDELBERGISSN: 2190-8508Frequency: 4 issues/year

The Journal of Cryptographic Engineering, published by Springer Heidelberg, is a prominent platform dedicated to advancing the field of cryptography and its applications in secure communication and information security technologies. With the ISSN 2190-8508 and E-ISSN 2190-8516, this journal showcases rigorous and innovative research contributions from 2011 to 2024, reflecting its commitment to excellence in academic publishing. Recognized among the Q2 category in Computer Networks and Communications and Software, it ranks impressively within the Scopus framework, securing positions in the 59th and 54th percentiles respectively. The Journal aims to facilitate a comprehensive understanding of cryptographic techniques, promote collaboration among researchers, and provide a vital resource for students and professionals. By maintaining high standards of peer review and providing a platform for cutting-edge research, it plays a crucial role in shaping the future of cryptographic engineering.

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

Innovating the Future of Information Science.
Publisher: INST INFORMATION SCIENCEISSN: 1016-2364Frequency: 6 issues/year

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, published by the Institute of Information Science in Taiwan, is a pivotal platform for the dissemination of innovative research in the multidisciplinary fields of information science and engineering. Established in 1993, the journal primarily focuses on areas such as library and information sciences, human-computer interaction, hardware and architecture, as well as computational theory and software development. Despite holding a current Q4 ranking in several categories, the journal demonstrates significant potential for growth, particularly in computation and software systems, as evidenced by its Scopus rankings and percentiles. Researchers, professionals, and students will find this journal to be an invaluable resource to stay abreast of evolving theories and technologies in information science. The journal is accessible through traditional subscription models, fostering a broad academic outreach. It serves to enhance knowledge-sharing and collaboration within this dynamic and ever-evolving field.