International Journal of Information Security
Published by Springer Nature
ISSN : 1615-5262 eISSN : 1615-5270
Abbreviation : Int. J. Inf. Secur.
Aims & Scope
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 3.2 |
2024 | 2.40 |
Journal Rank
Year | Value |
---|---|
2024 | 7358 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 1204 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.753 |
Quartile
Year | Value |
---|---|
2024 | Q2 |
h-index
Year | Value |
---|---|
2024 | 55 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Engineering, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Security issues in cloud environments: a survey
Citation: 321
Authors: Diogo A. B., Liliana F. B., João V., Mário M., Pedro R. M.
-
Edit automata: enforcement mechanisms for run-time security policies
Citation: 234
Authors: Jay, Lujo, David
-
Opacity generalised to transition systems
Citation: 191
Authors: Jeremy W., Maciej, Laurent, Peter Y. A.
-
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
Citation: 185
Authors: Jean-Paul A., Hassan N., Ola, Ali
-
Principles of remote attestation
Citation: 175
Authors: George, Joshua, Peter, Amy, Jonathan, Brian, John, Ariel, Justin, Brian