Journal of Information Security and Applications

Scope & Guideline

Advancing the Frontiers of Information Security

Introduction

Immerse yourself in the scholarly insights of Journal of Information Security and Applications with our comprehensive guidelines detailing its aims and scope. This page is your resource for understanding the journal's thematic priorities. Stay abreast of trending topics currently drawing significant attention and explore declining topics for a full picture of evolving interests. Our selection of highly cited topics and recent high-impact papers is curated within these guidelines to enhance your research impact.
LanguageEnglish
ISSN2214-2126
PublisherELSEVIER
Support Open AccessNo
CountryUnited Kingdom
TypeJournal
Convergefrom 2013 to 2024
AbbreviationJ INF SECUR APPL / J. Inf. Secur. Appl.
Frequency6 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressRADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS

Aims and Scopes

The Journal of Information Security and Applications primarily focuses on advancing the field of information security through innovative research contributions that encompass a variety of areas related to cybersecurity, cryptography, privacy, and data protection. The journal aims to provide a platform for researchers and practitioners to share their findings, methodologies, and practical approaches to address the evolving challenges in information security.
  1. Cryptography and Secure Communication:
    Research related to cryptographic algorithms, protocols, and systems designed to secure communication channels. This includes advancements in encryption techniques, digital signatures, and secure messaging.
  2. Privacy and Data Protection:
    Studies focused on privacy-preserving techniques, data anonymization, and protection mechanisms that ensure user privacy in various applications, particularly in cloud computing and IoT environments.
  3. Malware Detection and Prevention:
    Innovations in detecting and mitigating malware threats, including the use of machine learning, deep learning, and behavioral analysis to identify malicious activities in software and networks.
  4. Access Control and Authentication:
    Research on methods and frameworks for secure access control, authentication schemes, and identity management, particularly in decentralized and cloud-based systems.
  5. Intrusion Detection and Response:
    Development of systems and methodologies for detecting intrusions and responding to security breaches in real-time, utilizing techniques from artificial intelligence and machine learning.
  6. Blockchain and Distributed Ledger Technologies:
    Exploration of blockchain applications, including secure transactions, smart contracts, and the integration of blockchain with other security paradigms for enhanced data integrity and transparency.
  7. Security in Emerging Technologies:
    Investigations into security challenges and solutions within emerging technologies such as IoT, 5G networks, and AI, focusing on their unique vulnerabilities and protective measures.
Recent publications in the Journal of Information Security and Applications indicate a shift towards more advanced and specialized topics within the field of information security. The emerging themes reflect current challenges and innovations in technology and security practices.
  1. Homomorphic Encryption and Privacy-Preserving Computation:
    There is a growing interest in homomorphic encryption and techniques that allow computations on encrypted data without decrypting it, which is crucial for secure data sharing in cloud environments.
  2. AI and Machine Learning for Security:
    The integration of artificial intelligence and machine learning in security applications is trending, with research focusing on automated threat detection, adaptive security measures, and predictive analytics.
  3. Federated Learning and Decentralized Models:
    Research on federated learning, which allows for collaborative model training without sharing raw data, is gaining traction, particularly for privacy-sensitive applications in healthcare and finance.
  4. Quantum-Safe Cryptography:
    As quantum computing poses a potential threat to classical cryptographic systems, there is an emerging focus on developing quantum-resistant algorithms to ensure long-term security.
  5. Data Integrity and Provenance:
    Studies addressing data integrity and provenance management, particularly in blockchain applications, are on the rise, reflecting the need for reliable tracking of data origins and modifications.
  6. Secure IoT Architectures:
    Research into secure architectures for IoT devices and networks is expanding, emphasizing the need for robust security measures to protect against the unique vulnerabilities of interconnected devices.

Declining or Waning

As the field of information security evolves, certain research areas appear to be declining in prominence within the Journal of Information Security and Applications. This decline may reflect shifts in technological focus, changing threat landscapes, or the maturation of specific security practices.
  1. Traditional Network Security:
    Research focused on traditional network security measures, such as firewalls and basic intrusion detection systems, is becoming less prevalent as more advanced, adaptive systems are being developed.
  2. Static Malware Analysis:
    The emphasis on static analysis techniques for malware detection is waning, as dynamic analysis and behavioral detection methods gain favor due to their effectiveness in dealing with sophisticated malware.
  3. Basic Encryption Techniques:
    There is a noticeable decrease in papers discussing basic encryption algorithms, with a shift towards more complex and innovative cryptographic approaches such as homomorphic encryption and quantum-resistant algorithms.
  4. Legacy Systems Security:
    Research dedicated to securing legacy systems is diminishing, likely due to the increasing adoption of modern architectures and the associated security practices that address contemporary threats.
  5. Single-Factor Authentication:
    The focus on single-factor authentication approaches is declining as multi-factor authentication methods become the standard for enhancing security in various applications.

Similar Journals

Cryptography

Exploring New Frontiers in Cryptography
Publisher: MDPIISSN: Frequency: 4 issues/year

Cryptography, an esteemed journal published by MDPI, focuses on the rapidly evolving fields of cryptography and information security, providing a platform for researchers and practitioners to share their findings and advancements. Since its inception in 2017, it has embraced an Open Access model, allowing unrestricted access to high-quality research articles, thereby fostering collaboration and innovation among academics globally. Based in Switzerland, this journal aims to cover a broad spectrum, from theoretical foundations to practical applications, contributing significantly to fields such as Applied Mathematics and Computer Science. Its impressive rankings in reputable databases like Scopus reflect its relevance and quality, holding a Q2 category in multiple disciplines, including Computational Theory and Mathematics and Computer Networks and Communications. With the continuous rise in importance of cybersecurity and data protection, Cryptography serves as a vital resource for professionals, students, and researchers dedicated to advancing knowledge in these critical areas.

COMPUTERS & SECURITY

Exploring the intersection of technology and law in security.
Publisher: ELSEVIER ADVANCED TECHNOLOGYISSN: 0167-4048Frequency: 8 issues/year

COMPUTERS & SECURITY is a leading international journal published by Elsevier Advanced Technology, dedicated to advancing the interdisciplinary field of cybersecurity. With an impact factor reflecting its prestige, this journal holds a remarkable Q1 ranking in both Computer Science and Law categories according to the 2023 rankings. Since its inception in 1982, it has provided a platform for high-quality research that addresses key challenges in computer security, cyber law, and technology policy, and aims to evolve as the digital landscape continues to transform. Researchers and professionals seeking to contribute to vital discussions about security vulnerabilities, threat mitigation, and legal frameworks will find this journal an invaluable resource. Although it is not open access, the journal maintains a robust presence in the scholarly community, with exceptional rankings in Scopus—#7 in Social Sciences (Law) and #18 in General Computer Science, both highlighting its critical role in shaping knowledge and practice in these fields.

International Journal of Information Security

Exploring Cutting-Edge Research in Information Security.
Publisher: SPRINGERISSN: 1615-5262Frequency: 6 issues/year

The International Journal of Information Security, published by Springer, stands as a premier platform for research in the rapidly evolving field of information security. Operating under ISSN 1615-5262 and E-ISSN 1615-5270, this journal has established a significant academic presence since its inception in 2005. With a commendable 2023 impact factor ranking, it holds a distinguished position in various categories, including Q1 in Information Systems and Safety, Risk, Reliability and Quality, and Q2 in Computer Networks and Communications and Software. This reflects the journal's commitment to publishing high-quality, peer-reviewed articles that advance both theoretical and practical aspects of information security. Researchers and professionals alike will find invaluable insights regarding the latest developments, methodologies, and trends in the field, making it an essential resource for staying current with contemporary challenges and solutions. By fostering a cross-disciplinary dialogue among security specialists, system engineers, and risk managers from around the globe, the journal not only enhances the academic discourse but also contributes to the practical application of findings in the industry.

International Journal on Information Technologies and Security

Pioneering Solutions for Digital Safety
Publisher: UNION SCIENTISTS BULGARIAISSN: 1313-8251Frequency: 4 issues/year

International Journal on Information Technologies and Security, published by UNION SCIENTISTS BULGARIA, is a pivotal interdisciplinary journal that explores the rapidly evolving fields of information technology and security. With a robust ISSN of 1313-8251, this journal serves as a platform for researchers, professionals, and students to disseminate their findings and innovations in cybersecurity, data protection, and IT system integrity. The journal's commitment to open access enhances accessibility, ensuring that pivotal research reaches a broader audience, encouraging collaboration and advancement in these critical areas. As an invaluable resource for those engaged in the study and application of information security measures, the International Journal on Information Technologies and Security plays an essential role in shaping the discourse and driving forward the knowledge necessary to tackle today’s technological challenges.

JOURNAL OF CRYPTOLOGY

Exploring the Frontiers of Applied Mathematics in Cryptology
Publisher: SPRINGERISSN: 0933-2790Frequency: 1 issue/year

JOURNAL OF CRYPTOLOGY, published by SPRINGER, stands at the forefront of research in the domains of applied mathematics, computer science applications, and software security. With a history of significant contributions since its inception in 1988, this esteemed journal encompasses a broad range of topics in cryptology, including but not limited to encryption, security protocols, and information security systems. Holding a prestigious Q1 classification in multiple fields, it ranks #45 out of 635 in Applied Mathematics and has esteemed positions in Computer Science categories, reflecting its influence and recognition in the academic community, as evidenced by its high percentiles. As a vital resource for researchers, professionals, and students, the JOURNAL OF CRYPTOLOGY not only aims to disseminate innovative findings and methodologies but also fosters an engaging discourse within the cryptology and cybersecurity realms. Notably, it offers access through traditional subscription models, ensuring that readers benefit from a rigorous selection of high-impact research articles. Explore groundbreaking advancements and contribute to the ongoing dialogue in this pivotal field through your engagement with our journal.

Annals of Telecommunications

Advancing telecommunications research for a connected future.
Publisher: SPRINGER INT PUBL AGISSN: 0003-4347Frequency: 6 issues/year

Annals of Telecommunications is a prestigious peer-reviewed journal published by SPRINGER INT PUBL AG, dedicated to advancing the field of electrical and electronic engineering. Established in 1946, this journal presents a comprehensive collection of research articles that address the latest trends and developments in telecommunications, including innovative technologies, systems, and applications. With an impressive Q2 ranking in the 2023 category of Electrical and Electronic Engineering and a Scopus rank in the 68th percentile, the journal serves as a vital platform for researchers, professionals, and students looking to disseminate groundbreaking findings and engage with contemporary challenges in the field. Although it is not an Open Access journal, it offers a wealth of knowledge that contributes to both academic and practical advancements in telecommunications. The Annals of Telecommunications remains an essential resource for anyone involved in telecommunication research and practice, fostering collaboration and knowledge exchange globally.

Internet Technology Letters

Navigating the Evolving World of Internet Applications.
Publisher: JOHN WILEY & SONS LTDISSN: Frequency: 6 issues/year

Internet Technology Letters, published by John Wiley & Sons Ltd, is a dynamic and rapidly evolving journal that focuses on the innovative applications and developments within the realms of Artificial Intelligence, Computer Networks and Communications, Information Systems, and Software. With its E-ISSN 2476-1508 and a defined convergence period from 2018 to 2024, this journal seeks to address emerging trends and critical challenges confronting the digital landscape today. Recognized in the Q3 quartile range across multiple computer science categories in 2023, it serves as a valuable resource for researchers, professionals, and students seeking to advance their knowledge and stay updated on significant technological advancements. While currently not an open-access journal, Internet Technology Letters holds a prominent position on platforms like Scopus, ranked within the middle percentiles, reflecting its contribution to the academic community. The journal aims to foster connectivity between academia and industry, encouraging submissions that promote interdisciplinary collaboration and innovation. By creating a platform for sharing groundbreaking research, Internet Technology Letters plays a crucial role in shaping future technological landscapes.

ISeCure-ISC International Journal of Information Security

Fostering Collaboration in Information Security Research
Publisher: IRANIAN SOC CRYPTOLOGYISSN: 2008-2045Frequency: 2 issues/year

ISeCure-ISC International Journal of Information Security, published by the Iranian Society of Cryptology, is a vital open-access platform dedicated to advancing the field of information security. Since its inception in 2009, the journal has strived to disseminate high-quality, peer-reviewed research that addresses contemporary challenges in information security, cryptography, and related computational disciplines. With an ISSN of 2008-2045 and an E-ISSN of 2008-3076, it has gained visibility in the academic community, evidenced by its Quartile 4 ranking across multiple categories such as Applied Mathematics, Computational Theory, and Information Systems. This journal aims to foster innovative solutions and theoretical advancements, targeting researchers, professionals, and students who seek to contribute to and learn from the latest developments in the field. By providing a venue for explorative and empirical research, ISeCure-ISC holds an important position in promoting knowledge and collaborative efforts within the global information security landscape.

Jordanian Journal of Computers and Information Technology

Catalyzing Academic Excellence in Computing Research
Publisher: Princess Sumaya Univ & SRSFISSN: 2413-9351Frequency: 4 issues/year

Jordanian Journal of Computers and Information Technology, published by Princess Sumaya University and SRSF, stands as a significant platform for scholarly research in the realm of computer science, particularly in topics related to emerging technologies and information systems. With its Open Access model initiated in 2015, the journal facilitates global access to high-quality research findings, embodying the principles of knowledge sharing and academic collaboration. The journal's ranking in the Q3 category of Computer Science (miscellaneous) and its placement in the 54th percentile of Scopus' General Computer Science rankings underscore its growing reputation among researchers and professionals alike. Situated in Amman, Jordan, the journal actively contributes to the regional and international discourse on computing methodologies, applications, and innovations, making it an indispensable resource for scholars seeking to advance their understanding and engage with contemporary issues in technology.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY

Connecting Research and Innovation in Cryptography
Publisher: TARU PUBLICATIONSISSN: 0972-0529Frequency: 8 issues/year

The Journal of Discrete Mathematical Sciences & Cryptography, published by Taru Publications, serves as a pivotal platform for researchers, professionals, and students in the fields of discrete mathematics and cryptography. Since its inception in 1998, the journal has consistently provided high-quality research articles, reviews, and case studies that span essential areas such as Algebra, Number Theory, and Applied Mathematics, achieving a Q3 category ranking in these disciplines as of 2023. With impressive Scopus rankings, including Rank #7 in Algebra and Number Theory and a notable 94th percentile status, this journal underscores its significance within the academic community. Although not an open access journal, it remains a crucial reference point for advancements in mathematical sciences, fostering scholarly dialogue and collaboration. As the field evolves, it continues to bridge theoretical frameworks and practical implementations, contributing substantially to the educational and professional landscape.