Volume: 8 Issue: 4 , 12/1/19

Year: 2019

Other

 

1. Black Hole Attack in Manets: Defending and Detecting Techniques

 

2. Minimal Linear Codes with Few Weights and Their Secret Sharing

 

3. Fingerprint Forensics in Crime Scene: A Computer Science Approach

 

4. Scalability Evaluation of Trust and Reputation Models for Wireless Sensor Networks

 

5. Analysis of cyber-attacks in IoT-based critical infrastructures

The scope of IJISS comprises original research on all aspects of security science, engineering and technology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. The IJISS does not charge any publication or processing fee.

IJISS is published 4 times in a year. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication.

Manuscripts previously published in another journal are not accepted. Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted.

A review article is expected to give in-depth information and satisfying evaluation of a topic supported with an extensive list of sources.

Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.

The coverage of IJISS includes the following topics, but not limited to: cryptology, information security, network security, cyber security and secure coding theory.

The IJISS currently has an acceptance rate of 17%. The IJISS has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, Index Copernicus, AE Global, Google Index, CNKI, so far.

The Journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering.

The Journal is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. The IJISS does not charge any publication or processing fee. The Journal currently has an acceptance rate of 17%. The Journal has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, CNKI, Index Copernicus, AE Global, Google Index, so far.

The coverage of IJISS includes the following topics, but not limited to:
  • • Cyber security
    • Blockchain
    • Cryptocurrencies
    • Securing Networks, Computers, Services, Systems, Databases
    • Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
    • Information Security Science (ISS) and Engineering
    • Cryptographic software and hardware for embedded systems,
    • Coding theory and applications of finite fields and elliptic curves to cryptography
    • Post-quantum cryptography
    • Artificial Intelligence Techniques for ISS and Engineering
    • Smart Card, RFID, NFC, Security of 3G, 4G, 5G, 6G, etc.
    • Recent Theory, Trends, Technologies and Applications in ISS
    • Security Risk Analysis, Modelling, Evaluation and Management
    • Security Weaknesses on Information and Communication
    • Secure Coding, Source Code Auditing and Review
    • Critical Information and Infrastructure Security
    • Security Standards, Protocols and Policies
    • Key and Identity Management Trust Models
    • Mobile Communication and Application Security
    • Data Privacy, Privacy Theory and Engineering
    • e-Governance and e-Government Security
    • Cryptography and Cryptoanalysis
    • Steganography and Steganalysis
    • Operating System Security
    • Clouds and Virtual Machine Security
    • E-Sign and Public Key Infrastructure
    • Securing Mobile Networks and Devices
    • Wireless, Ad Hoc and Sensor Network Security
    • Web and Web Application Security
    • Information Security Audits
    • Securing Digital Rights and Management
    • Penetration Tests, Tools and Techniques
    • Social Engineering Attacks and Prevention
    • Intrusion Detection and Prevention Systems
    • Content Protection
    • Malicious Software Threats and Protection
    • Public Awareness and Education for ISS
    • Future Directions and Challenges in ISS
    • Etichal Hacking
    • Software Security
    • Biometrics
    • Cyber security, Warefare, Defense and policies
    • IoT and Industry 4.0
    • M2M Security
    • Big Data

All authors are required to provide their ORCID. Manuscripts must be prepared and submitted in LaTeX format.

Articles submitted for publication are evaluated by two international reviewers, accept-decline decision is taken by the editorial board. Names of reviewers evaluating the articles arena informed to the authors (Blind peer review). The names of the authors not to be seen by the reviewers (double-blind peer review) is left to the preference of the authors. The authors using this preference should delete the lines of name and address in the article. Depending on the reviewers reports, the decision of major revision or minor revision can be given to the articles which are not seen enough. The articles which are not reached intended level or arena seemed enough in terms of scientific perspective are declined.

The IJISS does not charge any publication or processing fee.

Editor in Chief

Algorithms and Calculation Theory, Quantum Computation, Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other), Algebra and Number Theory
Artificial Reality

Associate Editor in Chief

Default avatar
Res. Assist. Dr. Kübra SEYHAN ONDOKUZ MAYIS ÜNİVERSİTESİ Web
Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other)

International Editorial Board (to be updated)

Ecir Uğur Küçüksille
Prof. Dr. Ecir Uğur KÜÇÜKSİLLE Süleyman Demirel University
Information and Computing Sciences, Software and Application Security, Natural Language Processing
Information Security and Cryptology, Cryptography, Algebra and Number Theory, Combinatorics and Discrete Mathematics (Excl. Physical Combinatorics)
Default avatar
Prof. Dr. Mustafa ALKAN Teknoloji Fakültesi Elektrik Elektronik Mühendisliği Bölümü
Information Security and Cryptology, Communications Engineering
Default avatar
Res. Assist. Dr. Kübra SEYHAN ONDOKUZ MAYIS ÜNİVERSİTESİ Web
Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other)
Atilla Elçi
Prof. Dr. Atilla ELÇİ HASAN KALYONCU ÜNİVERSİTESİ Web
Information Security and Cryptology
Coding, Information Theory and Compression, Computer Forensics, Cyber Espionage
Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other)
Default avatar
Prof. Dr. Tuğkan TUĞLULAR İZMİR YÜKSEK TEKNOLOJİ ENSTİTÜSÜ
Information Security Management, Computer Software
Oğuz Yayla
Assoc. Prof. Dr. Oğuz YAYLA ORTA DOĞU TEKNİK ÜNİVERSİTESİ Web
Information Security and Cryptology, Cryptography, Algebra and Number Theory
Default avatar
Prof. Dr. Zülfükar SAYGI TOBB UNIVERSITY OF ECONOMICS AND TECHNOLOGY
Information Security and Cryptology, Cryptography, Algebra and Number Theory, Combinatorics and Discrete Mathematics (Excl. Physical Combinatorics)
Default avatar
Asst. Prof. Dr. Alper UĞUR PAMUKKALE ÜNİVERSİTESİ, MÜHENDİSLİK FAKÜLTESİ
Information Security and Cryptology, Cryptography, Computer Software
Default avatar
Assoc. Prof. Dr. Ali İNAN Adana Alparslan Türkeş Bilim ve Teknoloji Üniversitesi
Information Security and Cryptology
Information Security Management, Information Security and Cryptology, System and Network Security
Information Systems, Information Modelling, Management and Ontologies, Information Security and Cryptology, Data Security and Protection, Data and Information Privacy, Cybersecurity and Privacy (Other)
Enis Karaarslan
Asst. Prof. Dr. Enis KARAARSLAN MUĞLA SITKI KOÇMAN ÜNİVERSİTESİ Web
Networking and Communications, Cyberphysical Systems and Internet of Things, Information Security and Cryptology, Data Security and Protection, Software and Application Security, Artificial Intelligence, Modelling and Simulation, Artificial Life and Complex Adaptive Systems
Cihangir Tezcan
Assoc. Prof. Dr. Cihangir TEZCAN ORTA DOĞU TEKNİK ÜNİVERSİTESİ
Information Security and Cryptology, Cryptography, Mathematical Sciences
Resul Daş
Prof. Dr. Resul DAŞ Firat University, Technology Faculty, Department of Software Engineering Web
Information Systems, Networking and Communications, Information Security and Cryptology, Big Data, Data Mining and Knowledge Discovery, Artificial Intelligence, Computer System Software, Computer Software
Ramazan Bayındır
Prof. Dr. Ramazan BAYINDIR GAZİ ÜNİVERSİTESİ- ANKARA Web
Electrical Engineering, Electrical Energy Transmission, Networks and Systems, Power Plants
İlker Özçelik
Asst. Prof. Dr. İlker ÖZÇELİK ESKİŞEHİR OSMANGAZİ ÜNİVERSİTESİ Web
Information Security Management, Networking and Communications, Parallel and Distributed System, Cyberphysical Systems and Internet of Things, System and Network Security, Cybersecurity and Privacy (Other)
Default avatar
Dr. Kamil OTAL TÜBİTAK BİLGEM UEKAE
Cryptography
Barış Bülent Kırlar
Prof. Dr. Barış Bülent KIRLAR Süleyman Demirel University
Information Security and Cryptology, Algebra and Number Theory
Default avatar
Prof. Dr. Muhammed Ali AYDIN ISTANBUL UNIVERSITY-CERRAHPASA
Information Security Management, Information Security and Cryptology, Cryptography, System and Network Security
Murat Karakus
Assoc. Prof. Murat KARAKUS ANKARA UNIVERSITY, FACULTY OF ENGINEERING Web
Information Security Management, Networking and Communications, Distributed Systems and Algorithms, Dependable Systems, Service Oriented Computing, Cyberphysical Systems and Internet of Things, Edge Computing, Distributed Computing and Systems Software (Other), System and Network Security
İbrahim Soğukpınar
Prof. Dr. İbrahim SOĞUKPINAR PİRİ REİS ÜNİVERSİTESİ
Information and Computing Sciences, Networking and Communications, Information Security and Cryptology
Default avatar
Prof. Dr. Şerif BAHTİYAR İSTANBUL TEKNİK ÜNİVERSİTESİ, BİLGİSAYAR VE BİLİŞİM FAKÜLTESİ Web
Information and Computing Sciences, Information Security Management
Default avatar
Prof. Dr. Vasif NABİYEV KARADENİZ TEKNİK ÜNİVERSİTESİ
Information and Computing Sciences, Information Security Management, Artificial Intelligence (Other)
Information and Computing Sciences
Murat Aydos
Assoc. Prof. Dr. Murat AYDOS HACETTEPE UNİVERSİTESİ Web
Machine Learning, Information Security and Cryptology, Communications Engineering

Technical Editors

Default avatar
Res. Assist. Dr. Kübra SEYHAN ONDOKUZ MAYIS ÜNİVERSİTESİ Web
Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other)
Information Security and Cryptology, Cryptography, Cybersecurity and Privacy (Other)

Editor Assistant and Technical Support (to be updated)

Default avatar
Dr. Instructor Bilgehan ARSLAN It is not affiliated with an institution
Image Processing, Deep Learning, Machine Learning Algorithms