Information Security Journal
Published by Taylor & Francis
ISSN : 1939-3555 eISSN : 1939-3547
Abbreviation : Inf. Secur. J.
Aims & Scope
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology.
We also seek to provide insight into current and existing professional development issues.
We welcome submissions that cover the following topics: Security Access Control Systems and Security Methodology Security Telecommunications and Network Security Business Continuity Planning and Disaster Recovery Planning Security Management Practices Security Architecture and Models Law, Investigation, and Ethics in Information Security Application and Systems Development Security Cryptography security Computer Operations Security Physical Security We are especially keen to receive manuscripts that explore Cloud Security, Health Care Information Security and Privacy and Cyber Forensics
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 1.4 |
2024 | 1.60 |
Journal Rank
Year | Value |
---|---|
2024 | 11799 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 334 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.489 |
Quartile
Year | Value |
---|---|
2024 | Q2 |
h-index
Year | Value |
---|---|
2024 | 33 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Decision Sciences, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Analysis of various data security techniques of steganography: A survey
Citation: 56
Authors: Sachin, Rashmi
-
Defending against Distributed Denial of Service Attacks: Issues and Challenges
Citation: 52
Authors: B. B., R. C., Manoj
-
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection
Citation: 48
Authors: Femi Emmanuel, Sakinat Oluwabukonla, Adebayo A., Adebola Olayinka, Joseph Bamidele
-
An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures
Citation: 42
Authors: Anupam Kumar, Rahamatullah, Rafiqul
-
A systematic review of detection and prevention techniques of SQL injection attacks
Citation: 40
Authors: Mohammed, Ashaar, Malik, Raad
-
Predicting Cyber Risks through National Vulnerability Database
Citation: 39
Authors: Su, Xinming, Doina