ACM Transactions on Privacy and Security
Published by Association for Computing Machinery
ISSN : 2471-2566 eISSN : 2471-2574
Abbreviation : ACM Trans. Priv. Secur.
Aims & Scope
ACM Transactions on Transactions on Privacy and Security (TOPS) is devoted to the study, analysis, and application of information security and privacy.
The journal takes a wide view of this topic and its mission is to publish the best original research in this area.
Submitted papers should have practical relevance to the construction, evaluation, application, or operation of security or privacy-critical systems.
Theoretical papers must provide compelling examples and make convincing arguments for the practical significance of their results.
Tutorial or survey papers will not be considered for publication.
TOPS was previously titled the ACM Transactions on Information and System Security (TISSEC), which was founded in 1998.
The renaming took place in 2016 to emphasize the journal's enlarged scope and its additional emphasis on privacy.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 2.8 |
2024 | 3.00 |
Quartile
Year | Value |
---|---|
2024 | Q1 |
Journal Rank
Year | Value |
---|---|
2024 | 7873 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 467 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.716 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Engineering, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Scalable Private Set Intersection Based on OT Extension
Citation: 214
Authors: Benny, Thomas, Michael
-
A General Framework for Adversarial Examples with Objectives
Citation: 128
Authors: Mahmood, Sruti, Lujo, Michael K.
-
Sancus 2.0
Citation: 75
Authors: Job, Jo Van, Jan Tobias, Frank, Pieter, Bart, Ingrid, Johannes, Tilo, Felix
-
Fast Proxy Re-Encryption for Publish/Subscribe Systems
Citation: 61
Authors: Yuriy, Kurt, Gyana, Vinod
-
Proactively Identifying Emerging Hacker Threats from the Dark Web
Citation: 58
Authors: Sagar, Hongyi, Hsinchun