Iet Information Security

Iet Information Security

信息安全

  • 4区 中科院分区
  • Q3 JCR分区

期刊简介

《Iet Information Security》是由Wiley出版社于2007年创办的英文国际期刊(ISSN: 1751-8709,E-ISSN: 1751-8717),该期刊长期致力于计算机:信息系统领域的创新研究,主要研究方向为工程技术-计算机:理论方法。作为SCIE收录期刊(JCR分区 Q3,中科院 4区),本刊采用OA开放获取模式(OA占比0.0236...%),以发表计算机:信息系统领域等方向的原创性研究为核心(研究类文章占比96.97%%)。凭借严格的同行评审与高效编辑流程,期刊年载文量精选控制在33篇,确保学术质量与前沿性。成果覆盖Web of Science、Scopus等国际权威数据库,为学者提供推动计算机科学领域高水平交流平台。

投稿咨询

投稿提示

Iet Information Security审稿周期约为 约6.0个月 。该刊近年未被列入国际预警名单,年发文量约33篇,录用竞争适中,主题需确保紧密契合计算机科学前沿。投稿策略提示:避开学术会议旺季投稿以缩短周期,语言建议专业润色提升可读性。

  • 计算机科学 大类学科
  • English 出版语言
  • 是否预警
  • SCIE 期刊收录
  • 33 发文量

中科院分区

中科院 SCI 期刊分区 2023年12月升级版

Top期刊 综述期刊 大类学科 小类学科
计算机科学
4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统 COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区 4区

中科院 SCI 期刊分区 2022年12月升级版

Top期刊 综述期刊 大类学科 小类学科
计算机科学
4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统 COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区 4区

JCR分区

按JIF指标学科分区 收录子集 分区 排名 百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS SCIE Q3 182 / 249

27.1%

学科:COMPUTER SCIENCE, THEORY & METHODS SCIE Q3 80 / 143

44.4%

按JCI指标学科分区 收录子集 分区 排名 百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS SCIE Q4 190 / 251

24.5%

学科:COMPUTER SCIENCE, THEORY & METHODS SCIE Q3 98 / 143

31.82%

CiteScore

CiteScore SJR SNIP CiteScore 排名
CiteScore:3.8 SJR:0.48 SNIP:0.654
学科类别 分区 排名 百分位
大类:Computer Science 小类:Computer Networks and Communications Q2 193 / 395

51%

大类:Computer Science 小类:Information Systems Q2 193 / 394

51%

大类:Computer Science 小类:Software Q3 222 / 407

45%

期刊发文

  • MHSDN: A Hierarchical Software Defined Network Reliability Framework design

    Author: Zhu, Zhengbin; Liu, Qinrang; Liu, Dongpei; Ge, ChenYang; Wang, Chong

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 102-117. DOI: 10.1049/ise2.12080

  • DeepCatra: Learning flow- and graph-based behaviours for Android malware detection

    Author: Wu, Yafei; Shi, Jian; Wang, Peicheng; Zeng, Dongrui; Sun, Cong

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 118-130. DOI: 10.1049/ise2.12082

  • A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders

    Author: Wang, Yi-feng; Guo, Yuan-bo; Fang, Chen

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 244-254. DOI: 10.1049/ise2.12088

  • Robust private information retrieval for low encoding/decoding complexity distributed storage

    Author: Dai, Mingjun; Deng, Haiyan; Li, Xiaofeng; Su, Gongchao; Zhang, Zhonghao

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 255-268. DOI: 10.1049/ise2.12090

  • Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things

    Author: Ren, Junyu; Wan, Haibin; Zhu, Chaoyang; Qin, Tuanfa

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 269-288. DOI: 10.1049/ise2.12091

  • Improved integral cryptanalysis of SPNbox in digital rights management systems

    Author: Liu, Jun; Wang, Dachao; Hu, Yupu; Chen, Jie; Wang, Baocang

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 147-158. DOI: 10.1049/ise2.12087

  • Arithmetic correlation of binary half-l-sequences

    Author: Chen, Zhixiong; Edemskiy, Vladimir; Niu, Zhihua; Sang, Yuqi

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 2, pp. 289-293. DOI: 10.1049/ise2.12093

  • Efficient module learning with errors-based post-quantum password-authenticated key exchange

    Author: Ren, Peixin; Gu, Xiaozhuo; Wang, Ziliang

    Journal: IET INFORMATION SECURITY. 2023; Vol. 17, Issue 1, pp. 3-17. DOI: 10.1049/ise2.12094