Journal of Information Security and Applications

Scope & Guideline

Transforming Knowledge into Secure Solutions

Introduction

Explore the comprehensive scope of Journal of Information Security and Applications through our detailed guidelines, including its aims and scope. Stay updated with trending and emerging topics, and delve into declining areas to understand shifts in academic interest. Our guidelines also showcase highly cited topics, featuring influential research making a significant impact. Additionally, discover the latest published papers and those with high citation counts, offering a snapshot of current scholarly conversations. Use these guidelines to explore Journal of Information Security and Applications in depth and align your research initiatives with current academic trends.
LanguageEnglish
ISSN2214-2126
PublisherELSEVIER
Support Open AccessNo
CountryUnited Kingdom
TypeJournal
Convergefrom 2013 to 2024
AbbreviationJ INF SECUR APPL / J. Inf. Secur. Appl.
Frequency6 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressRADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS

Aims and Scopes

The Journal of Information Security and Applications primarily focuses on advancing the field of information security through innovative research contributions that encompass a variety of areas related to cybersecurity, cryptography, privacy, and data protection. The journal aims to provide a platform for researchers and practitioners to share their findings, methodologies, and practical approaches to address the evolving challenges in information security.
  1. Cryptography and Secure Communication:
    Research related to cryptographic algorithms, protocols, and systems designed to secure communication channels. This includes advancements in encryption techniques, digital signatures, and secure messaging.
  2. Privacy and Data Protection:
    Studies focused on privacy-preserving techniques, data anonymization, and protection mechanisms that ensure user privacy in various applications, particularly in cloud computing and IoT environments.
  3. Malware Detection and Prevention:
    Innovations in detecting and mitigating malware threats, including the use of machine learning, deep learning, and behavioral analysis to identify malicious activities in software and networks.
  4. Access Control and Authentication:
    Research on methods and frameworks for secure access control, authentication schemes, and identity management, particularly in decentralized and cloud-based systems.
  5. Intrusion Detection and Response:
    Development of systems and methodologies for detecting intrusions and responding to security breaches in real-time, utilizing techniques from artificial intelligence and machine learning.
  6. Blockchain and Distributed Ledger Technologies:
    Exploration of blockchain applications, including secure transactions, smart contracts, and the integration of blockchain with other security paradigms for enhanced data integrity and transparency.
  7. Security in Emerging Technologies:
    Investigations into security challenges and solutions within emerging technologies such as IoT, 5G networks, and AI, focusing on their unique vulnerabilities and protective measures.
Recent publications in the Journal of Information Security and Applications indicate a shift towards more advanced and specialized topics within the field of information security. The emerging themes reflect current challenges and innovations in technology and security practices.
  1. Homomorphic Encryption and Privacy-Preserving Computation:
    There is a growing interest in homomorphic encryption and techniques that allow computations on encrypted data without decrypting it, which is crucial for secure data sharing in cloud environments.
  2. AI and Machine Learning for Security:
    The integration of artificial intelligence and machine learning in security applications is trending, with research focusing on automated threat detection, adaptive security measures, and predictive analytics.
  3. Federated Learning and Decentralized Models:
    Research on federated learning, which allows for collaborative model training without sharing raw data, is gaining traction, particularly for privacy-sensitive applications in healthcare and finance.
  4. Quantum-Safe Cryptography:
    As quantum computing poses a potential threat to classical cryptographic systems, there is an emerging focus on developing quantum-resistant algorithms to ensure long-term security.
  5. Data Integrity and Provenance:
    Studies addressing data integrity and provenance management, particularly in blockchain applications, are on the rise, reflecting the need for reliable tracking of data origins and modifications.
  6. Secure IoT Architectures:
    Research into secure architectures for IoT devices and networks is expanding, emphasizing the need for robust security measures to protect against the unique vulnerabilities of interconnected devices.

Declining or Waning

As the field of information security evolves, certain research areas appear to be declining in prominence within the Journal of Information Security and Applications. This decline may reflect shifts in technological focus, changing threat landscapes, or the maturation of specific security practices.
  1. Traditional Network Security:
    Research focused on traditional network security measures, such as firewalls and basic intrusion detection systems, is becoming less prevalent as more advanced, adaptive systems are being developed.
  2. Static Malware Analysis:
    The emphasis on static analysis techniques for malware detection is waning, as dynamic analysis and behavioral detection methods gain favor due to their effectiveness in dealing with sophisticated malware.
  3. Basic Encryption Techniques:
    There is a noticeable decrease in papers discussing basic encryption algorithms, with a shift towards more complex and innovative cryptographic approaches such as homomorphic encryption and quantum-resistant algorithms.
  4. Legacy Systems Security:
    Research dedicated to securing legacy systems is diminishing, likely due to the increasing adoption of modern architectures and the associated security practices that address contemporary threats.
  5. Single-Factor Authentication:
    The focus on single-factor authentication approaches is declining as multi-factor authentication methods become the standard for enhancing security in various applications.

Similar Journals

Journal of Cryptographic Engineering

Advancing secure communication through innovative cryptographic research.
Publisher: SPRINGER HEIDELBERGISSN: 2190-8508Frequency: 4 issues/year

The Journal of Cryptographic Engineering, published by Springer Heidelberg, is a prominent platform dedicated to advancing the field of cryptography and its applications in secure communication and information security technologies. With the ISSN 2190-8508 and E-ISSN 2190-8516, this journal showcases rigorous and innovative research contributions from 2011 to 2024, reflecting its commitment to excellence in academic publishing. Recognized among the Q2 category in Computer Networks and Communications and Software, it ranks impressively within the Scopus framework, securing positions in the 59th and 54th percentiles respectively. The Journal aims to facilitate a comprehensive understanding of cryptographic techniques, promote collaboration among researchers, and provide a vital resource for students and professionals. By maintaining high standards of peer review and providing a platform for cutting-edge research, it plays a crucial role in shaping the future of cryptographic engineering.

Journal of Computer Networks and Communications

Unleashing Insights for a Connected World
Publisher: HINDAWI LTDISSN: 2090-7141Frequency: 1 issue/year

The Journal of Computer Networks and Communications is a premier open-access journal published by HINDAWI LTD, dedicated to advancing the field of computer networks and communications. With an ISSN of 2090-7141 and an E-ISSN of 2090-715X, this journal has been accessible to researchers since its inception in 2011, promoting widespread dissemination of knowledge in this rapidly evolving discipline. Based in Egypt, the journal's editorial standards are upheld through a rigorous peer-review process, contributing to its strong academic reputation. As of 2023, it holds a commendable Q2 ranking in Computer Networks and Communications and a Q3 ranking in Information Systems within its category quartiles. According to Scopus rankings, it occupies the 141st and 143rd positions in its respective fields, showcasing its relevance and influence in the academic community. The journal's mission is to publish high-quality research that addresses contemporary challenges in networking technologies and systems, making it an essential resource for researchers, professionals, and students seeking to innovate and excel in these fields.

Information Security Journal

Advancing the Frontiers of Information Security.
Publisher: TAYLOR & FRANCIS INCISSN: 1939-3555Frequency: 6 issues/year

The Information Security Journal, published by Taylor & Francis Inc, is a pioneering platform dedicated to disseminating knowledge in the realms of information security, computer science applications, and information systems management. With an ISSN of 1939-3555 and an E-ISSN of 1939-3547, this journal has successfully carved its niche within the Q2 quartile of the 2023 rankings for both Computer Science Applications and Information Systems and Management, while also being recognized in Q3 for the Software category. Located in the United Kingdom, the journal has been committed to advancing research and fostering innovation from 2008 through 2024, making it an essential resource for academics and professionals alike. With a significant Scopus ranking in its fields—placing 43rd out of 148 in Decision Sciences and 271st out of 817 in Computer Science Applications—the journal stands as a vital source of interdisciplinary insights. Although it does not currently offer open access options, the quality of publications and the journal's dedication to the field ensure that it remains a compelling choice for researchers seeking to publish their findings or stay abreast of current developments in information security.

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING

Exploring New Frontiers in Computational Theory.
Publisher: INST INFORMATION SCIENCEISSN: 1016-2364Frequency: 6 issues/year

JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, published by the Institute of Information Science in Taiwan, is a pivotal platform for the dissemination of innovative research in the multidisciplinary fields of information science and engineering. Established in 1993, the journal primarily focuses on areas such as library and information sciences, human-computer interaction, hardware and architecture, as well as computational theory and software development. Despite holding a current Q4 ranking in several categories, the journal demonstrates significant potential for growth, particularly in computation and software systems, as evidenced by its Scopus rankings and percentiles. Researchers, professionals, and students will find this journal to be an invaluable resource to stay abreast of evolving theories and technologies in information science. The journal is accessible through traditional subscription models, fostering a broad academic outreach. It serves to enhance knowledge-sharing and collaboration within this dynamic and ever-evolving field.

International Arab Journal of Information Technology

Connecting Scholars to Transform the Tech World
Publisher: ZARKA PRIVATE UNIVISSN: 1683-3198Frequency: 6 issues/year

Welcome to the International Arab Journal of Information Technology, a prestigious publication under the aegis of ZARKA PRIVATE UNIVERSITY in Jordan, dedicated to advancing the field of Information Technology. First established in 2008, this journal has made significant strides in disseminating high-quality research, achieving an impressive Q2 ranking in Computer Science (miscellaneous) and securing a notable 57th percentile position in the Scopus rankings. With a comprehensive scope encompassing various sub-disciplines of computer science, the journal is committed to promoting scholarly dialogue and innovation among researchers, professionals, and students. While currently operating as a subscription-only journal, it remains a vital resource for the academic community seeking to explore the latest trends and advancements in technology. The International Arab Journal of Information Technology is not only a platform for original research but also a vibrant hub for ideas that shape the technological landscape of the Arab region and beyond.

Journal of Computer Security

Elevating discourse in the realm of digital safety.
Publisher: IOS PRESSISSN: 0926-227XFrequency: 6 issues/year

Welcome to the Journal of Computer Security, a premier publication dedicated to advancing the field of cybersecurity and digital safety. Published by IOS PRESS, this esteemed journal has been at the forefront of research since its inception, with a rich history spanning from 1992 to 2024. Based in the Netherlands, the journal aims to provide a reputable platform for researchers and professionals to disseminate innovative findings in various subfields, including computer networks, hardware architecture, and software engineering. With its current Q3 ranking across multiple categories and a focus on safety, risk, reliability, and quality, the journal plays a critical role in shaping contemporary discourse and fostering collaboration within the cybersecurity community. Though it is not an open-access journal, the Journal of Computer Security remains a vital resource for academics and practitioners alike, offering access to significant advancements and methodologies that guide the evolution of security practices worldwide. Engage with us and contribute to this dynamic field of study!

Annals of Telecommunications

Advancing telecommunications research for a connected future.
Publisher: SPRINGER INT PUBL AGISSN: 0003-4347Frequency: 6 issues/year

Annals of Telecommunications is a prestigious peer-reviewed journal published by SPRINGER INT PUBL AG, dedicated to advancing the field of electrical and electronic engineering. Established in 1946, this journal presents a comprehensive collection of research articles that address the latest trends and developments in telecommunications, including innovative technologies, systems, and applications. With an impressive Q2 ranking in the 2023 category of Electrical and Electronic Engineering and a Scopus rank in the 68th percentile, the journal serves as a vital platform for researchers, professionals, and students looking to disseminate groundbreaking findings and engage with contemporary challenges in the field. Although it is not an Open Access journal, it offers a wealth of knowledge that contributes to both academic and practical advancements in telecommunications. The Annals of Telecommunications remains an essential resource for anyone involved in telecommunication research and practice, fostering collaboration and knowledge exchange globally.

ISeCure-ISC International Journal of Information Security

Fostering Collaboration in Information Security Research
Publisher: IRANIAN SOC CRYPTOLOGYISSN: 2008-2045Frequency: 2 issues/year

ISeCure-ISC International Journal of Information Security, published by the Iranian Society of Cryptology, is a vital open-access platform dedicated to advancing the field of information security. Since its inception in 2009, the journal has strived to disseminate high-quality, peer-reviewed research that addresses contemporary challenges in information security, cryptography, and related computational disciplines. With an ISSN of 2008-2045 and an E-ISSN of 2008-3076, it has gained visibility in the academic community, evidenced by its Quartile 4 ranking across multiple categories such as Applied Mathematics, Computational Theory, and Information Systems. This journal aims to foster innovative solutions and theoretical advancements, targeting researchers, professionals, and students who seek to contribute to and learn from the latest developments in the field. By providing a venue for explorative and empirical research, ISeCure-ISC holds an important position in promoting knowledge and collaborative efforts within the global information security landscape.

Cryptography

Fostering Collaboration in Cryptographic Research
Publisher: MDPIISSN: Frequency: 4 issues/year

Cryptography, an esteemed journal published by MDPI, focuses on the rapidly evolving fields of cryptography and information security, providing a platform for researchers and practitioners to share their findings and advancements. Since its inception in 2017, it has embraced an Open Access model, allowing unrestricted access to high-quality research articles, thereby fostering collaboration and innovation among academics globally. Based in Switzerland, this journal aims to cover a broad spectrum, from theoretical foundations to practical applications, contributing significantly to fields such as Applied Mathematics and Computer Science. Its impressive rankings in reputable databases like Scopus reflect its relevance and quality, holding a Q2 category in multiple disciplines, including Computational Theory and Mathematics and Computer Networks and Communications. With the continuous rise in importance of cybersecurity and data protection, Cryptography serves as a vital resource for professionals, students, and researchers dedicated to advancing knowledge in these critical areas.

Journal of Computer Virology and Hacking Techniques

Innovating Strategies for Cybersecurity Excellence
Publisher: SPRINGER FRANCEISSN: 2263-8733Frequency: 4 issues/year

Welcome to the Journal of Computer Virology and Hacking Techniques, a prestigious academic publication dedicated to the evolving fields of cybersecurity and digital threats. Published by Springer France, this open-access journal has been at the forefront of disseminating high-quality research since its inception in 2014. With an increasing impact in areas such as computational theory, hardware architecture, and software security, the journal holds a significant position, classified in the Q2 and Q3 quartiles across several categories in 2023. The journal aims to provide a platform for researchers, professionals, and students to explore the latest advances in combatting cyber vulnerabilities and understanding hacking techniques. In alignment with its open-access policy, the journal ensures that knowledge is readily available to a global audience, reinforcing its mission to enhance the scholarly discourse surrounding computer virality while adhering to rigorous academic standards.