International Journal of Information Security

International Journal of Information Security

INT J INF SECUR
影响因子:3.2
是否综述期刊:
是否预警:不在预警名单内
是否OA:
出版国家/地区:GERMANY
出版社:Springer Berlin Heidelberg
发刊时间:2001
发刊频率:Bimonthly
收录数据库:SCIE/Scopus收录
ISSN:1615-5262

期刊介绍

The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation. Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.
《国际信息安全杂志》是一份关于信息安全研究的英语期刊,提供重要技术工作的及时出版,无论是理论性的、适用性的还是与实施有关的。服务范围包括系统安全性:入侵检测、安全终端系统、安全操作系统、数据库安全、安全基础设施、安全评估;网络安全:互联网安全、防火墙、移动的安全、安全代理、协议、防病毒和防黑客措施;内容保护:水印、软件保护、防篡改软件;应用领域:电子商务、政府、健康、电信、移动性。
年发文量 111
国人发稿量 9.72
国人发文占比 0.09%
自引率 -
平均录取率0
平均审稿周期 平均12.0个月
版面费 US$2990
偏重研究方向 工程技术-计算机:理论方法
期刊官网 https://www.springer.com/10207
投稿链接 https://www.editorialmanager.com/ijis/

期刊高被引文献

Hydras and IPFS: a decentralised playground for malware
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00443-0
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00464-9
SonarSnoop: active acoustic side-channel attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00449-8
A novel graph-based approach for IoT botnet detection
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00475-6
A study of IoT malware activities using association rule learning for darknet sensor data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00439-w
Secure implementations of a random bisection cut
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00463-w
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00437-y
Encouraging users to improve password security and memorability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00429-y
Provably secure public-key encryption with conjunctive and subset keyword search
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-018-00426-7
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00434-1
The IoT security gap: a look down into the valley between threat models and their implementation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00445-y
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00465-8
An improved FOO voting scheme using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00457-8
Signature schemes with a fuzzy private key
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00428-z
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00456-9
Lightweight multi-factor mutual authentication protocol for IoT devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00484-5
Protection against reverse engineering in ARM
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00450-1
DroidRista: a highly precise static data flow analysis framework for android applications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00471-w
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00430-5
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00462-x
Attacks on smart grid: power supply interruption and malicious power generation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00452-z
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00453-y
Security attacks on smart grid scheduling and their defences: a game-theoretic approach
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00460-z
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00436-z
FOTB: a secure blockchain-based firmware update framework for IoT environment
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00467-6
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00448-9
Repairing an aggregation-based smart metering system
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00435-0
Random dictatorship for privacy-preserving social choice
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00474-7
DUEF-GA: data utility and privacy evaluation framework for graph anonymization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00469-4
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00441-2
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00459-6
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00476-5
Analysis of some simple stabilizers for physically obfuscated keys
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00473-8
Message from the guest editors
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00472-9
Security analysis of secure kNN and ranked keyword search over encrypted data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00461-y
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00458-7
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00432-3
PDGuard: an architecture for the control and secure processing of personal data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00468-5
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00466-7
Cyberattack triage using incremental clustering for intrusion detection systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00478-3
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00455-w
File Guard: automatic format-based media file sanitization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00440-3
Group rekeying based on member join history
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00451-0
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00454-x
User-mediated authentication protocols and unforgeability in key collision
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00479-2
Key pre-distribution approach using block LU decomposition in wireless sensor network
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00477-4
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00480-9
Secure and trusted partial grey-box verification
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00431-4
Digital Waste Disposal: an automated framework for analysis of spam emails
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00470-x
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00447-w

质量指标占比

研究类文章占比 OA被引用占比 撤稿占比 出版后修正文章占比
99.10%35.28%-1.39%

相关指数

影响因子
影响因子
年发文量
自引率
Cite Score

预警情况

查看说明
时间 预警情况
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
*来源:中科院《 国际期刊预警名单》

JCR分区

WOS分区等级:Q2区
版本 按学科 分区
WOS期刊SCI分区
WOS期刊SCI分区
WOS期刊SCI分区是指SCI官方(Web of Science)为每个学科内的期刊按照IF数值排 序,将期刊按照四等分的方法划分的Q1-Q4等级,Q1代表质量最高,即常说的1区期刊。
(2024-2025年最新版)
COMPUTER SCIENCE, INFORMATION SYSTEMS
Q2

中科院分区

查看说明
版本 大类学科 小类学科 Top期刊 综述期刊
2025年3月最新升级版
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区
2023年12月升级版
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区
2022年12月旧的升级版
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区