International Journal of Information and Computer Security
ISSN:1744-1765

International Journal of Information and Computer Security

学科领域:计算机科学
是否预警:不在预警名单内
是否OA:
录用周期:-
新锐分区:计算机科学4区
年发文量:53
影响因子:0.6
JCR分区:Q4

基本信息

-
1744-1765ESCI/Scopus收录
0.6
0
2026年3月发布
点击查看历史分区趋势    >
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
N/A
WOS期刊SCI分区  2024-2025最新升级版
按JIF指标学科分区收集子录JIF分区JIF排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
ESCI
Q4
233/258
按JCR指标学科分区收集子录JCR分区JCR排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
ESCI
Q4
233/258
暂无h-index数据
53
----Engineering-Safety, Risk, Reliability and Quality
33.3%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
100.00%0.56%-
CiteScore:1.60
SJR:0.204
SNIP:0.301
学科类别分区排名百分位
大类:Engineering
小类:Safety, Risk, Reliability and Quality
Q3
140 / 235
大类:Engineering
小类:Computer Networks and Communications
Q3
341 / 507
大类:Engineering
小类:Hardware and Architecture
Q4
173 / 224
大类:Engineering
小类:Software
Q4
378 / 490

期刊高被引文献

Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018470
Cloud-based DDoS attack detection and defence system using statistical approach
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018796
SQL injection attacks - a systematic review
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023476
A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023470
Novel implementation of defence strategy of relay attack based on cloud in RFID systems
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10007915
Reconfigurable design and implementation of nonlinear Boolean function for cloud computing security platform
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018855
PrivacyContext: identifying malicious mobile privacy leak using program context
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10024486
A study of the internet financial interest rate risk evaluation index system in cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018852
A generic construction of identity-based proxy signature scheme in the standard model
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10016329
Study on data fuzzy breakpoint detection in massive dynamic data flow
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10024487
An ontology-based approach to improve access policy administration of attribute-based access control
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023471
Image encryption scheme based on a novel fractional order compound chaotic attractor
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10027643
Password security by encryption using an extended ADFGVX cipher
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023477
An efficient authentication and key agreement scheme for e-health applications in the context of internet of things
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018795
Behavioural analysis approach for IDS based on attack pattern and risk assessment in cloud computing
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10013935
An efficient user authentication model for IOT-based healthcare environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023077
SPHERES: an efficient server-side web application protection system
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017572
An authentication scheme for distributed computing environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023136
Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017217
Reversible data hiding methods in integer wavelet transform
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10014436
MONcrypt: a technique to ensure the confidentiality of outsourced data in cloud storage
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10014390
CB-ALCA: a cluster-based adaptive lightweight cryptographic algorithm for secure routing in wireless sensor networks
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10023268
Detection algorithm for internet worms scanning that used user datagram protocol
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10016150
A multi-agent system approach based on cryptographic algorithm for securing communications and protecting stored data in the cloud-computing environment
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/ijics.2019.10023472
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10017573
Comparative evaluation of different classification techniques for masquerade attack detection
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10020664
An ensemble algorithm for discovery of malicious web pages
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10020533
Proofs of retrievability from linearly homomorphic structure-preserving signatures
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018857
Outsourcing computation for private function evaluation
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10024485
CSPS: catchy short passwords making offline and online attacks impossible
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018618
VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme
来源期刊:International Journal of Information and Computer SecurityDOI:10.1504/IJICS.2019.10018472

相关文章

2026年3月发布(新锐分区)
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
N/A