International Journal of Information Security and Applications (IJISA)

Download as rtf, pdf, or txt
Download as rtf, pdf, or txt
You are on page 1of 2

International Journal of Information Security and Applications(IJISA)

ISSN 0974 - 624N (Online) ; 0175 - 2190 (Print)

http://skycs.org/jounals/ijisa/Home.html

Scope
International Journal of Information Security and Applications(IJISA) is a open access journal
that publishes articles which contribute new results in all areas Information Security and Applications.
The journal focuses on all technical and practical aspects of Information Security and Applications.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the
Information Security and Applications.

Topics of interest include, but are not limited to, the following
 Cryptographic protocols  E- Commerce
 Cryptography and Coding  Access Control and Intrusion Detection
 Untraceability  Intrusion Detection and Vulnerability
 Privacy and authentication
Assessment
 Key management
 Authentication and Non-repudiation
 Authentication
 Identification and Authentication
 Trust Management
 Insider Threats and Countermeasures
 Quantum cryptography
 Intrusion Detection & Prevention
 Computational Intelligence in Security
 Secure Cloud Computing
 Artificial Immune Systems
 Security Information Systems Architecture and
 Biological & Evolutionary Computation
 Intelligent Agents and Systems Design and Security Patterns
 Reinforcement & Unsupervised Learning  Security Management
 Autonomy-Oriented Computing  Security Requirements (threats, vulnerabilities,
 Coevolutionary Algorithms risk, formal methods, etc.)
 Fuzzy Systems  Sensor and Mobile Ad Hoc Network Security
 Biometric Security  Service and Systems Design and QoS Network
 Trust models and metrics Security
 Regulation and Trust Mechanisms  Software Security
 Data Integrity  Security and Privacy in Mobile Systems
 Models for Authentication, Trust and Authorization  Security and Privacy in Pervasive/Ubiquitous
 Wireless Network Security Computing
 Information Hiding  Security and Privacy in Web Sevices
 Data & System Integrity  Security and Privacy Policies
 Security Area Control
 Security Deployment
 Security Engineering
  Security for Grid ComputingSecurity in
Distributed Systems
Paper Submission

Authors are invited to submit papers for this journal through Submission System. Submissions must
be original and should not have been published previously or be under consideration for publication
while being evaluated for this Journal.

Important Dates
· Submission Deadline :July 13, 2019
· Notification :August 13, 2019
· Final Manuscript Due :August 21, 2019
· Publication Date : Determined by the Editor-in-Chief

TO SUBMIT YOUR PAPER, PLEASE CLICK THE FOLLOWING LINK Submission System.

Contacts

Here's where you can reach us: [email protected]

You might also like