—— 要投稿,上万维,轻松学术交流

严正声明

本站非期刊官网,非中介代理,
不向作者收取任何费用!
举报微信:13140028228 冯老师

态度公正、信息求实、投稿自助、使用免费
Journal of Information Security and Applications《信息安全与应用杂志》
年8期 - 英国
  • Journal of Information Security and Applications《信息安全与应用杂志》
  • SCIE外文期刊
  • 期发文量20
  • 国人占比52.54%
  • 知网外文库
  • 投稿方式--官网投稿
  • 期刊属性

  • 中科分区:3区
    OA期刊:混合
  • 综述期刊:
    TOP期刊:
  • 期均国文:10
    环比增速:-40.00%
  • 期刊信息

  • 研究方向:计算机科学-COMPUTER SCIENCE, INFORMATION SYSTEMS计算机:信息系统
  • 国际刊号:ISSN 2214-2126;EISSN 2214-2134
  • 期刊语言:英语
    出版地区:英国
  • 投稿网址:https://www.editorialmanager.com/jisas/default.aspx
  • 电子邮箱:
  • 期刊官网:https://www.journals.elsevier.com/journal-of-information-security-and-applications
  • 作者指南:
  • 出版商网址:http://www.elsevier.com
  • 出版地址:RADARWEG 29, AMSTERDAM, NETHERLANDS, 1043 NX
  • 期刊简介:Journal of Information Security and Applications《信息安全与应用杂志》(一年8期). Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.

  • 万维提示


  • 1、投稿方式:在线投稿。

    2、期刊网址:

    https://www.journals.elsevier.com/journal-of-information-security-and-applications

    https://www.sciencedirect.com/journal/journal-of-information-security-and-applications

    3、投稿网址:

    https://www.editorialmanager.com/jisas/default.aspx

    4、期刊刊期:一年出版8期。

    2021年1123日星期二

                              

     

    投稿须知【官网信息】

     

    Guide for Authors

    Aims and scope

    Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.

    The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA.

    JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications.

    Current JISA topics

    Authentication and access control

    Anonymity and privacy

    Cryptographic protection

    Digital forensics

    Human factors in security

    Multimedia security

    Network and mobile security

    Security management and policies

    Hardware and physical security

    Journal of Information Security and Applications is a quarterly technical report, focused on a specific topic. It is aimed at senior information security managers, who need to gain a better understanding of current information security issues and solutions, and provides 'off-the shelf' consultancy from professional researchers and practitioners.

    The main objective of the report is to provide a balanced, impartial, up to date, and authoritative view of specific topics within the information security arena.

    Submission checklist

    You can use this list to carry out a final check of your submission before you send it to the journal for review. Please check the relevant section in this Guide for Authors for more details.

    Ensure that the following items are present:

    One author has been designated as the corresponding author with contact details:

    E-mail address

    Full postal address

    All necessary files have been uploaded:

    Manuscript:

    Include keywords

    All figures (include relevant captions)

    All tables (including titles, description, footnotes)

    Ensure all figure and table citations in the text match the files provided

    Indicate clearly if color should be used for any figures in print

    Graphical Abstracts / Highlights files (where applicable)

    Supplemental files (where applicable)

    Further considerations

    Manuscript has been 'spell checked' and 'grammar checked'

    All references mentioned in the Reference List are cited in the text, and vice versa

    Permission has been obtained for use of copyrighted material from other sources (including the Internet)

    A competing interests statement is provided, even if the authors have no competing interests to declare

    Journal policies detailed in this guide have been reviewed

    Referee suggestions and contact details provided, based on journal requirements

    ……

    更多详情:

    https://www.elsevier.com/journals/journal-of-information-security-and-applications/2214-2126/guide-for-authors



欢迎点评!让信息更透明,使投稿更轻松!
  • 审稿时间:
    是否录用:
  • 见刊周期:
    查重要求:
  • 有无课题:
    有无回复:
  • 我的学历:
    我的职称:
  • 审稿费用:
    版面费用:
  • 稿       费:
    稿件字数:
  • 投稿难度:
  • 该刊可发:
  • 投稿主题:
匿名: 验证码: 点击切换验证码
    评分:0

    验证码: 点击切换验证码