Unable to connect, retrying...
Online collaborative whiteboard. Powerful, engaging with timer, emoji's, commenting and voting.
Search for RSS feeds

International Journal of Information Security Science

Welcome to The International Journal of Information Security Science (IJISS) website! The Journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering. The Journal is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. The Journal currently has an acceptance rate of 32%. The Journal has been indexed by EBSCO, DOAJ, Index Copernicus, Google Index, so far. The coverage of IJISS includes the following topics, but not limited to: ·Securing Networks, Computers, Services, Systems, Databases ·Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology ·Information Security Science (ISS) and Engineering ·Cryptographic software and hardware for embedded systems, ·Coding theory and applications of finite fields and elliptic curves to cryptography ·Artificial Intelligence Techniques for ISS and Engineering ·Smart Card, RFID, NFC, 3G, 4G, etc. Security ·Recent Theory, Trends, Technologies and Applications in ISS ·Security Risk Analysis, Modelling, Evaluation and Management ·Security Weaknesses on Information and Communication ·Secure Coding, Source Code Auditing and Review ·Critical Information and Infrastructure Security ·Security Standards, Protocols and Policies ·Key and Identity Management Trust Models ·Mobile Communication and Application Security ·Data Privacy, Privacy Theory and Engineering ·e-Governance and e-Government Security ·Cryptography and Cryptoanalysis ·Steganography and Steganalysis ·Operating System Security ·Clouds and Virtual Machine Security ·E-Sign and Public Key Infrastructure ·Securing Mobile Networks and Devices ·Wireless, Ad Hoc and Sensor Network Security ·Web and Web Application Security ·Information Security Audits ·Securing Digital Rights and Management ·Penetration Tests, Tools and Techniques ·Social Engineering Attacks and Prevention ·Intrusion Detection and Prevention Systems ·Content Protection ·Malicious Software Threats and Protection ·Public Awareness and Education for ISS ·Future Directions and Challenges in ISS ·Etichal Hacking ·Software Security ·Biometrics ·Cyber security, Warefare, Defense and policies ·M2M Security