Journal of Information Security and Applications

Scope & Guideline

Pioneering Research for a Secure Digital Future

Introduction

Welcome to your portal for understanding Journal of Information Security and Applications, featuring guidelines for its aims and scope. Our guidelines cover trending and emerging topics, identifying the forefront of research. Additionally, we track declining topics, offering insights into areas experiencing reduced scholarly attention. Key highlights include highly cited topics and recently published papers, curated within these guidelines to assist you in navigating influential academic dialogues.
LanguageEnglish
ISSN2214-2126
PublisherELSEVIER
Support Open AccessNo
CountryUnited Kingdom
TypeJournal
Convergefrom 2013 to 2024
AbbreviationJ INF SECUR APPL / J. Inf. Secur. Appl.
Frequency6 issues/year
Time To First Decision-
Time To Acceptance-
Acceptance Rate-
Home Page-
AddressRADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS

Aims and Scopes

The Journal of Information Security and Applications primarily focuses on advancing the field of information security through innovative research contributions that encompass a variety of areas related to cybersecurity, cryptography, privacy, and data protection. The journal aims to provide a platform for researchers and practitioners to share their findings, methodologies, and practical approaches to address the evolving challenges in information security.
  1. Cryptography and Secure Communication:
    Research related to cryptographic algorithms, protocols, and systems designed to secure communication channels. This includes advancements in encryption techniques, digital signatures, and secure messaging.
  2. Privacy and Data Protection:
    Studies focused on privacy-preserving techniques, data anonymization, and protection mechanisms that ensure user privacy in various applications, particularly in cloud computing and IoT environments.
  3. Malware Detection and Prevention:
    Innovations in detecting and mitigating malware threats, including the use of machine learning, deep learning, and behavioral analysis to identify malicious activities in software and networks.
  4. Access Control and Authentication:
    Research on methods and frameworks for secure access control, authentication schemes, and identity management, particularly in decentralized and cloud-based systems.
  5. Intrusion Detection and Response:
    Development of systems and methodologies for detecting intrusions and responding to security breaches in real-time, utilizing techniques from artificial intelligence and machine learning.
  6. Blockchain and Distributed Ledger Technologies:
    Exploration of blockchain applications, including secure transactions, smart contracts, and the integration of blockchain with other security paradigms for enhanced data integrity and transparency.
  7. Security in Emerging Technologies:
    Investigations into security challenges and solutions within emerging technologies such as IoT, 5G networks, and AI, focusing on their unique vulnerabilities and protective measures.
Recent publications in the Journal of Information Security and Applications indicate a shift towards more advanced and specialized topics within the field of information security. The emerging themes reflect current challenges and innovations in technology and security practices.
  1. Homomorphic Encryption and Privacy-Preserving Computation:
    There is a growing interest in homomorphic encryption and techniques that allow computations on encrypted data without decrypting it, which is crucial for secure data sharing in cloud environments.
  2. AI and Machine Learning for Security:
    The integration of artificial intelligence and machine learning in security applications is trending, with research focusing on automated threat detection, adaptive security measures, and predictive analytics.
  3. Federated Learning and Decentralized Models:
    Research on federated learning, which allows for collaborative model training without sharing raw data, is gaining traction, particularly for privacy-sensitive applications in healthcare and finance.
  4. Quantum-Safe Cryptography:
    As quantum computing poses a potential threat to classical cryptographic systems, there is an emerging focus on developing quantum-resistant algorithms to ensure long-term security.
  5. Data Integrity and Provenance:
    Studies addressing data integrity and provenance management, particularly in blockchain applications, are on the rise, reflecting the need for reliable tracking of data origins and modifications.
  6. Secure IoT Architectures:
    Research into secure architectures for IoT devices and networks is expanding, emphasizing the need for robust security measures to protect against the unique vulnerabilities of interconnected devices.

Declining or Waning

As the field of information security evolves, certain research areas appear to be declining in prominence within the Journal of Information Security and Applications. This decline may reflect shifts in technological focus, changing threat landscapes, or the maturation of specific security practices.
  1. Traditional Network Security:
    Research focused on traditional network security measures, such as firewalls and basic intrusion detection systems, is becoming less prevalent as more advanced, adaptive systems are being developed.
  2. Static Malware Analysis:
    The emphasis on static analysis techniques for malware detection is waning, as dynamic analysis and behavioral detection methods gain favor due to their effectiveness in dealing with sophisticated malware.
  3. Basic Encryption Techniques:
    There is a noticeable decrease in papers discussing basic encryption algorithms, with a shift towards more complex and innovative cryptographic approaches such as homomorphic encryption and quantum-resistant algorithms.
  4. Legacy Systems Security:
    Research dedicated to securing legacy systems is diminishing, likely due to the increasing adoption of modern architectures and the associated security practices that address contemporary threats.
  5. Single-Factor Authentication:
    The focus on single-factor authentication approaches is declining as multi-factor authentication methods become the standard for enhancing security in various applications.

Similar Journals

Cluster Computing-The Journal of Networks Software Tools and Applications

Catalyzing Progress in Software Tools and Applications
Publisher: SPRINGERISSN: 1386-7857Frequency: 4 issues/year

Cluster Computing - The Journal of Networks Software Tools and Applications, published by Springer, is a premier academic journal catering to the vibrant fields of computer networks and software technologies. With an impressive impact factor and recognized as a Q1 journal in both Computer Networks and Communications and Software categories for 2023, it ranks within the top echelons of its field, boasting a Scopus rank of #50 out of 395 and #59 out of 407 respectively, highlighting its influence and reach. The journal, which has been in continuous publication since 2005, serves as a vital platform for groundbreaking research, offering insightful articles and tools that drive innovation in network computing. Researchers, professionals, and students are invited to contribute to and benefit from the dynamic discourse presented in this journal, which is pivotal for advancing knowledge and enhancing practical applications in a rapidly evolving technological landscape.

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY

Pioneering Research in Cryptography and Algebra
Publisher: TARU PUBLICATIONSISSN: 0972-0529Frequency: 8 issues/year

The Journal of Discrete Mathematical Sciences & Cryptography, published by Taru Publications, serves as a pivotal platform for researchers, professionals, and students in the fields of discrete mathematics and cryptography. Since its inception in 1998, the journal has consistently provided high-quality research articles, reviews, and case studies that span essential areas such as Algebra, Number Theory, and Applied Mathematics, achieving a Q3 category ranking in these disciplines as of 2023. With impressive Scopus rankings, including Rank #7 in Algebra and Number Theory and a notable 94th percentile status, this journal underscores its significance within the academic community. Although not an open access journal, it remains a crucial reference point for advancements in mathematical sciences, fostering scholarly dialogue and collaboration. As the field evolves, it continues to bridge theoretical frameworks and practical implementations, contributing substantially to the educational and professional landscape.

International Journal of Electronic Security and Digital Forensics

Empowering researchers to enhance digital safety measures.
Publisher: INDERSCIENCE ENTERPRISES LTDISSN: 1751-911XFrequency: 4 issues/year

The International Journal of Electronic Security and Digital Forensics, published by INDERSCIENCE ENTERPRISES LTD, is a leading platform for disseminating scholarly research in the realms of cybersecurity, digital forensics, and electronic security. Established with the objective of bridging the gap between theoretical advancements and practical applications, the journal spans critical areas such as network security, legal implications of digital forensics, and reliability in safety measures. With its ISSN 1751-911X and E-ISSN 1751-9128, the journal aims to provide valuable insights into emerging technologies and methodologies while maintaining high academic standards, as reflected in its diverse quartile rankings across multiple categories in 2023. Operating from the United Kingdom and catering to a global audience, the journal is committed to fostering innovative research that contributes to safer digital environments. Researchers, professionals, and students will find a wealth of information and opportunities for collaboration in this specialized field, making International Journal of Electronic Security and Digital Forensics an essential resource for advancing knowledge and practice.

Journal of Cloud Computing-Advances Systems and Applications

Harnessing the Potential of Cloud for Tomorrow
Publisher: SPRINGERISSN: Frequency: 1 issue/year

The Journal of Cloud Computing - Advances Systems and Applications, published by Springer, serves as a premier platform for disseminating cutting-edge research in the fields of cloud computing, computer networks, and software technologies. With an impressive impact factor and ranked in the top quartile for Computer Networks and Communications and Software categories in 2023, this open access journal has gained significant recognition within the academic community since its establishment in 2012. The journal not only provides valuable insights into innovative applications and advancements in cloud technologies but also supports collaboration among scholars, practitioners, and industry leaders. Operating from the vibrant hub of New York City, it boasts a robust international readership, ensuring that the latest findings reach a diverse audience. Authors and researchers are encouraged to engage with this vital resource, which is dedicated to exploring the transformative potential of cloud computing across multiple disciplines.

Jordanian Journal of Computers and Information Technology

Advancing Research and Collaboration in Emerging Technologies
Publisher: Princess Sumaya Univ & SRSFISSN: 2413-9351Frequency: 4 issues/year

Jordanian Journal of Computers and Information Technology, published by Princess Sumaya University and SRSF, stands as a significant platform for scholarly research in the realm of computer science, particularly in topics related to emerging technologies and information systems. With its Open Access model initiated in 2015, the journal facilitates global access to high-quality research findings, embodying the principles of knowledge sharing and academic collaboration. The journal's ranking in the Q3 category of Computer Science (miscellaneous) and its placement in the 54th percentile of Scopus' General Computer Science rankings underscore its growing reputation among researchers and professionals alike. Situated in Amman, Jordan, the journal actively contributes to the regional and international discourse on computing methodologies, applications, and innovations, making it an indispensable resource for scholars seeking to advance their understanding and engage with contemporary issues in technology.

Journal of Information Assurance and Security

Innovating Solutions for a Safer Digital Realm.
Publisher: DYNAMIC PUBLISHERS, INCISSN: 1554-1010Frequency: 6 issues/year

Journal of Information Assurance and Security, an esteemed publication by DYNAMIC PUBLISHERS, INC, serves as a pivotal platform for the dissemination of innovative research and insights in the field of information security and assurance. With its ISSN 1554-1010 and E-ISSN 1554-1029, this journal addresses critical vulnerabilities, emerging technologies, and methodologies that fortify data integrity and uphold privacy in our increasingly digital world. Although specific metrics such as the HIndex and Scopus ranks are currently unavailable, the journal is recognized for its contributions to both academia and industry, fostering collaboration among researchers, professionals, and students dedicated to advancing security protocols. The journal does not currently offer open access but ensures comprehensive accessibility through institutional subscriptions. As cybersecurity continues to be a paramount concern globally, the Journal of Information Assurance and Security stands out as an essential resource for groundbreaking studies and practical applications that drive the future of information protection.

Internet Technology Letters

Fostering Interdisciplinary Collaboration for a Smarter Future.
Publisher: JOHN WILEY & SONS LTDISSN: Frequency: 6 issues/year

Internet Technology Letters, published by John Wiley & Sons Ltd, is a dynamic and rapidly evolving journal that focuses on the innovative applications and developments within the realms of Artificial Intelligence, Computer Networks and Communications, Information Systems, and Software. With its E-ISSN 2476-1508 and a defined convergence period from 2018 to 2024, this journal seeks to address emerging trends and critical challenges confronting the digital landscape today. Recognized in the Q3 quartile range across multiple computer science categories in 2023, it serves as a valuable resource for researchers, professionals, and students seeking to advance their knowledge and stay updated on significant technological advancements. While currently not an open-access journal, Internet Technology Letters holds a prominent position on platforms like Scopus, ranked within the middle percentiles, reflecting its contribution to the academic community. The journal aims to foster connectivity between academia and industry, encouraging submissions that promote interdisciplinary collaboration and innovation. By creating a platform for sharing groundbreaking research, Internet Technology Letters plays a crucial role in shaping future technological landscapes.

EURASIP Journal on Information Security

Advancing the frontier of information security research.
Publisher: SPRINGER INT PUBL AGISSN: 2510-523XFrequency: 1 issue/year

EURASIP Journal on Information Security, published by Springer International Publishing AG, is a premier open access journal dedicated to the rapid dissemination of research findings in the field of information security. With an ISSN of 2510-523X and a strong reputation reflected in its 2023 quartile rankings—Q1 in Computer Science Applications and Q2 in Signal Processing—this journal serves as a critical platform for researchers, professionals, and students alike to explore cutting-edge advancements in security technologies and methodologies. Established in 2007 as an open access journal, it promotes accessibility and encourages collaboration among the global scientific community. The journal's objectives include fostering innovative research that addresses the complex challenges of information security in today's digital landscape. With its base in the United Kingdom, EURASIP Journal on Information Security is committed to contributing to the evolution of security practices, ensuring that its audience stays at the forefront of the discipline.

Information Security Journal

Pioneering Insights for a Secure Digital Future.
Publisher: TAYLOR & FRANCIS INCISSN: 1939-3555Frequency: 6 issues/year

The Information Security Journal, published by Taylor & Francis Inc, is a pioneering platform dedicated to disseminating knowledge in the realms of information security, computer science applications, and information systems management. With an ISSN of 1939-3555 and an E-ISSN of 1939-3547, this journal has successfully carved its niche within the Q2 quartile of the 2023 rankings for both Computer Science Applications and Information Systems and Management, while also being recognized in Q3 for the Software category. Located in the United Kingdom, the journal has been committed to advancing research and fostering innovation from 2008 through 2024, making it an essential resource for academics and professionals alike. With a significant Scopus ranking in its fields—placing 43rd out of 148 in Decision Sciences and 271st out of 817 in Computer Science Applications—the journal stands as a vital source of interdisciplinary insights. Although it does not currently offer open access options, the quality of publications and the journal's dedication to the field ensure that it remains a compelling choice for researchers seeking to publish their findings or stay abreast of current developments in information security.

JOURNAL OF CRYPTOLOGY

Fostering Discourse in the Evolving World of Cryptography
Publisher: SPRINGERISSN: 0933-2790Frequency: 1 issue/year

JOURNAL OF CRYPTOLOGY, published by SPRINGER, stands at the forefront of research in the domains of applied mathematics, computer science applications, and software security. With a history of significant contributions since its inception in 1988, this esteemed journal encompasses a broad range of topics in cryptology, including but not limited to encryption, security protocols, and information security systems. Holding a prestigious Q1 classification in multiple fields, it ranks #45 out of 635 in Applied Mathematics and has esteemed positions in Computer Science categories, reflecting its influence and recognition in the academic community, as evidenced by its high percentiles. As a vital resource for researchers, professionals, and students, the JOURNAL OF CRYPTOLOGY not only aims to disseminate innovative findings and methodologies but also fosters an engaging discourse within the cryptology and cybersecurity realms. Notably, it offers access through traditional subscription models, ensuring that readers benefit from a rigorous selection of high-impact research articles. Explore groundbreaking advancements and contribute to the ongoing dialogue in this pivotal field through your engagement with our journal.