International Journal of Security and Networks
Published by Inderscience Publishers
ISSN : 1747-8405 eISSN : 1747-8413
Abbreviation : Int. J. Secur. Netw.
Aims & Scope
IJSN proposes and fosters discussion on and dissemination of network security related issues.
Topics covered include: -Cellular networks, wireless LANs, PANs, MANs, sensor/ad hoc networks- Mobile IP, IP and satellite networks, wireless internet/communications- Wired/wireless integrated networks- Internet/WWW, high-speed/P2P networks, VoIP, e-mail- Optical systems/networks, integrated/content-delivery networks- Domain name service, communications, distributed systems- Attacks, security mechanisms/services, authentication/authorisation, access control- Multicast security, data confidentiality/integrity, on-repudiation- Firewalls, privacy protection, security specification, encryption/decryption- Formal analyses, group communications, intrusion detection, anonymity- Key management, trust establishment, malicious parties' revocation, security policies- Fraudulent usage, prevention of traffic analysis, denial of service- PHY/MAC/routing protocols, dependability/reliability, secure location determination- Performance evaluation, performance/security tradeoff analysis- Network forensics, design/analysis of security protocols, security standards.
View Aims & ScopeMetrics & Ranking
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.171 |
Quartile
Year | Value |
---|---|
2024 | Q4 |
h-index
Year | Value |
---|---|
2024 | 28 |
Journal Rank
Year | Value |
---|---|
2024 | 23058 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 54 |
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Engineering, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
Citation: 254
Authors: Giuseppe, Luigi V., Angelo, Antonio, Domenico, Giovanni
-
Elliptic curve cryptography-based access control in sensor networks
Citation: 115
Authors: Haodong, Bo, Qun
-
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
Citation: 113
Authors: Mrinmoy, Xiaohui, Rongxing, Xuemin
-
Towards modelling the impact of cyber attacks on a smart grid
Citation: 97
Authors: D., X., S., S., T., K.L. Butler
-
Secure and privacy-preserving information aggregation for smart grids
Citation: 79
Authors: Fengjun, Bo, Peng
-
Secure scalable group signature with dynamic joins and separable authorities
Citation: 79
Authors: Aggelos, Moti
-
Visualisation of wormholes in underwater sensor networks: a distributed approach
Citation: 60
Authors: Weichao, Jiejun, Bharat, Mario
-
Network forensics analysis using Wireshark
Citation: 50
Authors: Vivens, Zhifeng, Vasudeva Rao, Ke, Yang
-
Seeing-Is-Believing: using camera phones for human-verifiable authentication
Citation: 45
Authors: Jonathan M., Adrian, Michael K.
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
Citation: 42
Authors: Dijiang