Journal Of Information Security And Applications

Journal Of Information Security And Applications

信息安全与应用杂志

  • 2区 中科院分区
  • Q2 JCR分区

期刊简介

《Journal Of Information Security And Applications》是由Elsevier Ltd出版社于2013年创办的英文国际期刊(ISSN: 2214-2126,E-ISSN: 2214-2134),该期刊长期致力于计算机:信息系统领域的创新研究,主要研究方向为Computer Science-Computer Networks and Communications。作为SCIE收录期刊(JCR分区 Q2,中科院 2区),本刊采用OA未开放获取模式(OA占比0.0157...%),以发表计算机:信息系统领域等方向的原创性研究为核心(研究类文章占比99.52%%)。凭借严格的同行评审与高效编辑流程,期刊年载文量精选控制在207篇,确保学术质量与前沿性。成果覆盖Web of Science、Scopus等国际权威数据库,为学者提供推动计算机科学领域高水平交流平台。

投稿咨询

投稿提示

Journal Of Information Security And Applications审稿周期约为 。该刊近年未被列入国际预警名单,年发文量约207篇,录用竞争适中,主题需确保紧密契合计算机科学前沿。投稿策略提示:避开学术会议旺季投稿以缩短周期,语言建议专业润色提升可读性。

  • 计算机科学 大类学科
  • English 出版语言
  • 是否预警
  • SCIE 期刊收录
  • 207 发文量

中科院分区

中科院 SCI 期刊分区 2023年12月升级版

Top期刊 综述期刊 大类学科 小类学科
计算机科学
2区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
3区

中科院 SCI 期刊分区 2022年12月升级版

Top期刊 综述期刊 大类学科 小类学科
计算机科学
3区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
3区

JCR分区

按JIF指标学科分区 收录子集 分区 排名 百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS SCIE Q2 70 / 249

72.1%

按JCI指标学科分区 收录子集 分区 排名 百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS SCIE Q1 56 / 251

77.89%

CiteScore

CiteScore SJR SNIP CiteScore 排名
CiteScore:10.9 SJR:1.264 SNIP:1.653
学科类别 分区 排名 百分位
大类:Engineering 小类:Safety, Risk, Reliability and Quality Q1 13 / 207

93%

大类:Engineering 小类:Computer Networks and Communications Q1 36 / 395

91%

大类:Engineering 小类:Software Q1 46 / 407

88%

期刊发文

  • Certificateless ring signature from NTRU lattice for electronic voting

    Author: Yu, Huifang; Hui, Wenxuan

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 75, Issue , pp. -. DOI: 10.1016/j.jisa.2023.103496

  • Improving fraud detection via hierarchical attention-based Graph Neural Network

    Author: Liu, Yajing; Sun, Zhengya; Zhang, Wensheng

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 72, Issue , pp. -. DOI: 10.1016/j.jisa.2022.103399

  • Tweakable SM4: How to tweak SM4 into tweakable block ciphers?

    Author: Guo, Zhenzhen; Wang, Gaoli; Dunkelman, Orr; Pan, Yinxue; Liu, Shengyuan

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 72, Issue , pp. -. DOI: 10.1016/j.jisa.2022.103406

  • Towards interpreting vulnerability of object detection models via adversarial distillation

    Author: Zhang, Yaoyuan; Tan, Yu-an; Lu, Mingfeng; Liu, Lu; Wang, Dianxin; Zhang, Quanxing; Li, Yuanzhang

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 73, Issue , pp. -. DOI: 10.1016/j.jisa.2022.103410

  • Multi-field relation mining for malicious HTTP traffic detection based on attention and cross network

    Author: Wu, Bolun; Zou, Futai; Zhang, Chengwei; Yu, Tangda; Li, Yun

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 73, Issue , pp. -. DOI: 10.1016/j.jisa.2022.103411

  • (k, n) secret image sharing scheme with privileged set

    Author: Yang, Ching-Nung; Li, Peng; Kuo, Hsin-Chuan

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 73, Issue , pp. -. DOI: 10.1016/j.jisa.2022.103413

  • ASSBert: Active and semi-supervised bert for smart contract vulnerability detection

    Author: Sun, Xiaobing; Tu, Liangqiong; Zhang, Jiale; Cai, Jie; Li, Bin; Wang, Yu

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 73, Issue , pp. -. DOI: 10.1016/j.jisa.2023.103423

  • Reversible demosaiced image authentication scheme with recoverability using clustering and matching techniques

    Author: Zhou, Xiaoyu; Hong, Wien; Chen, Tung-Shou; Yang, Guangsong

    Journal: JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. 2023; Vol. 73, Issue , pp. -. DOI: 10.1016/j.jisa.2023.103425