International Journal of Information Security
ISSN:1615-5262

International Journal of Information Security

INT J INF SECUR
学科领域:计算机科学
是否预警:不在预警名单内
是否OA:
录用周期:约12.0个月
新锐分区:计算机科学3区
年发文量:111
影响因子:3.2
JCR分区:Q2

基本信息

《国际信息安全杂志》是一份关于信息安全研究的英语期刊,提供重要技术工作的及时出版,无论是理论性的、适用性的还是与实施有关的。服务范围包括系统安全性:入侵检测、安全终端系统、安全操作系统、数据库安全、安全基础设施、安全评估;网络安全:互联网安全、防火墙、移动的安全、安全代理、协议、防病毒和防黑客措施;内容保护:水印、软件保护、防篡改软件;应用领域:电子商务、政府、健康、电信、移动性。
1615-5262SCIE/Scopus收录
3.2
4.9
2026年3月发布
点击查看历史分区趋势    >
大类学科小类学科Top期刊综述期刊
计算机科学3区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
3区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
3区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
2区
N/A
WOS期刊SCI分区  2024-2025最新升级版
按JIF指标学科分区收集子录JIF分区JIF排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
SCIE
Q2
109/258
学科:COMPUTER SCIENCE, SOFTWARE ENGINEERING
SCIE
Q2
39/129
学科:COMPUTER SCIENCE, THEORY & METHODS
SCIE
Q2
42/147
按JCR指标学科分区收集子录JCR分区JCR排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
SCIE
Q2
112/258
学科:COMPUTER SCIENCE, SOFTWARE ENGINEERING
SCIE
Q2
54/129
学科:COMPUTER SCIENCE, THEORY & METHODS
SCIE
Q2
52/147
35
111
9%约75%约12.0个月-工程技术-计算机:理论方法
6.2%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
99.10%35.28%1.39%
CiteScore:6.30
SJR:0.753
SNIP:1.497
学科类别分区排名百分位
大类:Engineering
小类:Safety, Risk, Reliability and Quality
Q1
45 / 235
大类:Engineering
小类:Computer Networks and Communications
Q2
128 / 507
大类:Engineering
小类:Information Systems
Q2
124 / 474
大类:Engineering
小类:Software
Q2
139 / 490

期刊高被引文献

Hydras and IPFS: a decentralised playground for malware
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00443-0
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00464-9
SonarSnoop: active acoustic side-channel attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00449-8
A novel graph-based approach for IoT botnet detection
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00475-6
A study of IoT malware activities using association rule learning for darknet sensor data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00439-w
Secure implementations of a random bisection cut
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00463-w
A prototype implementation and evaluation of the malware detection mechanism for IoT devices using the processor information
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00437-y
Encouraging users to improve password security and memorability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00429-y
Provably secure public-key encryption with conjunctive and subset keyword search
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-018-00426-7
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00434-1
The IoT security gap: a look down into the valley between threat models and their implementation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00445-y
Chaintegrity: blockchain-enabled large-scale e-voting system with robustness and universal verifiability
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00465-8
An improved FOO voting scheme using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00457-8
Signature schemes with a fuzzy private key
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00428-z
EMBLEM: (R)LWE-based key encapsulation with a new multi-bit encoding method
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00456-9
Lightweight multi-factor mutual authentication protocol for IoT devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00484-5
Protection against reverse engineering in ARM
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00450-1
DroidRista: a highly precise static data flow analysis framework for android applications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00471-w
Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00430-5
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00462-x
Attacks on smart grid: power supply interruption and malicious power generation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00452-z
Feature dynamic deep learning approach for DDoS mitigation within the ISP domain
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00453-y
Security attacks on smart grid scheduling and their defences: a game-theoretic approach
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00460-z
SE-AOMDV: secure and efficient AOMDV routing protocol for vehicular communications
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00436-z
FOTB: a secure blockchain-based firmware update framework for IoT environment
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00467-6
Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00448-9
Repairing an aggregation-based smart metering system
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00435-0
Random dictatorship for privacy-preserving social choice
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00474-7
DUEF-GA: data utility and privacy evaluation framework for graph anonymization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00469-4
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00441-2
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00459-6
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00476-5
Analysis of some simple stabilizers for physically obfuscated keys
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00473-8
Message from the guest editors
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00472-9
Security analysis of secure kNN and ranked keyword search over encrypted data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00461-y
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00458-7
Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00432-3
PDGuard: an architecture for the control and secure processing of personal data
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00468-5
Concise ID-based mercurial functional commitments and applications to zero-knowledge sets
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00466-7
Cyberattack triage using incremental clustering for intrusion detection systems
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00478-3
SEDS: secure and efficient server-aided data deduplication scheme for cloud storage
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00455-w
File Guard: automatic format-based media file sanitization
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00440-3
Group rekeying based on member join history
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00451-0
Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00454-x
User-mediated authentication protocols and unforgeability in key collision
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00479-2
Key pre-distribution approach using block LU decomposition in wireless sensor network
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00477-4
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00480-9
Secure and trusted partial grey-box verification
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00431-4
Digital Waste Disposal: an automated framework for analysis of spam emails
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00470-x
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing
来源期刊:International Journal of Information SecurityDOI:10.1007/s10207-019-00447-w

相关文章

2026年3月发布(新锐分区)
大类学科小类学科Top期刊综述期刊
计算机科学3区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
3区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
3区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
2区
N/A
2025年3月升级版
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区
2023年12月旧的升级版
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
COMPUTER SCIENCE, SOFTWARE ENGINEERING 计算机:软件工程
4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法
4区