International Journal of Electronic Security and Digital Forensics
ISSN:1751-911X

International Journal of Electronic Security and Digital Forensics

INT J ELECTRON SECUR
学科领域:计算机科学
是否预警:不在预警名单内
是否OA:
录用周期:-
新锐分区:计算机科学4区
年发文量:50
影响因子:0.5
JCR分区:Q4

基本信息

-
1751-911XESCI/Scopus收录
0.5
0
2026年3月发布
点击查看历史分区趋势    >
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
N/A
WOS期刊SCI分区  2024-2025最新升级版
按JIF指标学科分区收集子录JIF分区JIF排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
ESCI
Q4
240/258
按JCR指标学科分区收集子录JCR分区JCR排名百分位
学科:COMPUTER SCIENCE, INFORMATION SYSTEMS
ESCI
Q4
248/258
暂无h-index数据
50
15%---COMPUTER SCIENCE, INFORMATION SYSTEMS-
20%
时间预警情况
2026年03月发布的新锐学术版不在预警名单中
2025年03月发布的2025版不在预警名单中
2024年02月发布的2024版不在预警名单中
2023年01月发布的2023版不在预警名单中
2021年12月发布的2021版不在预警名单中
2020年12月发布的2020版不在预警名单中
100.00%--
CiteScore:2.20
SJR:0.202
SNIP:0.558
学科类别分区排名百分位
大类:Social Sciences
小类:Law
Q2
287 / 1105
大类:Social Sciences
小类:Safety, Risk, Reliability and Quality
Q3
119 / 235
大类:Social Sciences
小类:Computer Networks and Communications
Q3
294 / 507

期刊高被引文献

Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021739
Drone forensics: examination and analysis
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020543
Combating credit card fraud with online behavioural targeting and device fingerprinting
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016642
Fingerprint authentication based on fuzzy extractor in the mobile device
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020550
A cryptographic data hiding algorithm with high cover text capacity
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016326
A novel LSB-based RDH with dual embedding for encrypted images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020549
Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020551
Study of e-governance in India: a survey
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018768
Dealing with the problem of collection and analysis of electronic evidence
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020553
ArMTFr: a new permutation-based image encryption scheme
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016637
Information security model using data embedding technique for enhancing perceptibility and robustness
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016643
Malware detection model based on classifying system calls and code attributes: a proof of concept
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018773
A survey on security analysis and privacy issues of wireless multimedia communication system
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020532
Cost-effective provable secure cloud storage self-auditing scheme for big data in WMSNS
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021738
The pseudo metadata concept for the chain of custody of digital evidence
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021732
Implementation of the PREDECI model in the prosecution of Chimborazo in Ecuador: a case study evaluation
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016641
Security methods and approaches for internal and external network hospital information systems with single sign-on
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021736
Comparison analysis of electricity theft detection methods for advanced metering infrastructure in smart grid
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020548
Secure Gray code-based reversible data hiding scheme in radiographic images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10020552
Evaluation of smartphone data using a reference architecture
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018774
Using machine learning and the first digit law to detect forgeries in digital images
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021737
Biometric data security using joint encryption and watermarking
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10021729
A novel median filtering forensics based on principal component analysis network
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10018772
A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography
来源期刊:International Journal of Electronic Security and Digital ForensicsDOI:10.1504/IJESDF.2019.10016644

相关文章

2026年3月发布(新锐分区)
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区
N/A
2025年3月升级版
大类学科小类学科Top期刊综述期刊
计算机科学4区
COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统
4区