Journal of Computer Security
Published by SAGE
ISSN : 0926-227X eISSN : 1875-8924
Abbreviation : J. Comput. Secur.
Aims & Scope
The Journal of Computer Security presents research and development results of lasting significance in the theory, design, implementation, analysis, and application of secure computer systems.
It also provides a forum for ideas about the meaning and implications of security and privacy, particularly those with important consequences for the technical community.
The journal provides an opportunity to publish articles of greater depth and length than is possible in the proceedings of various existing conferences, while addressing an audience of researchers in computer security who can be assumed to have a more specialized background than the readership of other archival publications.
The journal welcomes contributions on all aspects of computer security: confidentiality, integrity, and assurance of service - that is, protection against unauthorized disclosure or modification of sensitive information, or denial of service.
Of interest is a precise understanding of security policies through modelling, as well as the design and analysis of mechanisms for enforcing them, and the architectural principles of software and hardware systems implementing them.
View Aims & ScopeMetrics & Ranking
Impact Factor
Year | Value |
---|---|
2025 | 1.3 |
2024 | 0.90 |
Journal Rank
Year | Value |
---|---|
2024 | 16453 |
Journal Citation Indicator
Year | Value |
---|---|
2024 | 110 |
SJR (SCImago Journal Rank)
Year | Value |
---|---|
2024 | 0.306 |
Quartile
Year | Value |
---|---|
2024 | Q3 |
h-index
Year | Value |
---|---|
2024 | 59 |
Impact Factor Trend
Abstracting & Indexing
Journal is indexed in leading academic databases, ensuring global visibility and accessibility of our peer-reviewed research.
Subjects & Keywords
Journal’s research areas, covering key disciplines and specialized sub-topics in Computer Science and Engineering, designed to support cutting-edge academic discovery.
Most Cited Articles
The Most Cited Articles section features the journal's most impactful research, based on citation counts. These articles have been referenced frequently by other researchers, indicating their significant contribution to their respective fields.
-
Intrusion detection using sequences of system calls
Citation: 736
Authors: Steven A., Stephanie, Anil
-
Searchable symmetric encryption: Improved definitions and efficient constructions
Citation: 623
Authors: Reza, Juan, Seny, Rafail
-
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*
Citation: 458
Authors: Katherine, Lawrence A., Martin P., Lei
-
Automatic analysis of malware behavior using machine learning
Citation: 458
Authors: Konrad, Philipp, Carsten, Thorsten
-
Strand spaces: proving security protocols correct
Citation: 278
Authors: F. Javier, Jonathan C., Joshua D.
-
Practical automated detection of stealthy portscans
Citation: 227
Authors: Stuart, James A., Joseph M.