Volume: 8 Issue: 4, 12/1/19

Year: 2019

Research Article

 

. Black Hole Attack in Manets: Defending and Detecting Techniques

The scope of IJISS comprises original research on all aspects of security science, engineering and technology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. The IJISS does not charge any publication or processing fee.

IJISS is published 4 times in a year. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication.

Manuscripts previously published in another journal are not accepted. Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted.

A review article is expected to give in-depth information and satisfying evaluation of a topic supported with an extensive list of sources.

Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.

The coverage of IJISS includes the following topics, but not limited to: cryptology, information security, network security, cyber security and secure coding theory.

The IJISS currently has an acceptance rate of 17%. The IJISS has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, Index Copernicus, AE Global, Google Index, CNKI, so far.

The Journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering.

The Journal is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. The IJISS does not charge any publication or processing fee. The Journal currently has an acceptance rate of 17%. The Journal has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, CNKI, Index Copernicus, AE Global, Google Index, so far.

The coverage of IJISS includes the following topics, but not limited to:
  • • Cyber security
    • Blockchain
    • Cryptocurrencies
    • Securing Networks, Computers, Services, Systems, Databases
    • Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
    • Information Security Science (ISS) and Engineering
    • Cryptographic software and hardware for embedded systems,
    • Coding theory and applications of finite fields and elliptic curves to cryptography
    • Post-quantum cryptography
    • Artificial Intelligence Techniques for ISS and Engineering
    • Smart Card, RFID, NFC, Security of 3G, 4G, 5G, 6G, etc.
    • Recent Theory, Trends, Technologies and Applications in ISS
    • Security Risk Analysis, Modelling, Evaluation and Management
    • Security Weaknesses on Information and Communication
    • Secure Coding, Source Code Auditing and Review
    • Critical Information and Infrastructure Security
    • Security Standards, Protocols and Policies
    • Key and Identity Management Trust Models
    • Mobile Communication and Application Security
    • Data Privacy, Privacy Theory and Engineering
    • e-Governance and e-Government Security
    • Cryptography and Cryptoanalysis
    • Steganography and Steganalysis
    • Operating System Security
    • Clouds and Virtual Machine Security
    • E-Sign and Public Key Infrastructure
    • Securing Mobile Networks and Devices
    • Wireless, Ad Hoc and Sensor Network Security
    • Web and Web Application Security
    • Information Security Audits
    • Securing Digital Rights and Management
    • Penetration Tests, Tools and Techniques
    • Social Engineering Attacks and Prevention
    • Intrusion Detection and Prevention Systems
    • Content Protection
    • Malicious Software Threats and Protection
    • Public Awareness and Education for ISS
    • Future Directions and Challenges in ISS
    • Etichal Hacking
    • Software Security
    • Biometrics
    • Cyber security, Warefare, Defense and policies
    • IoT and Industry 4.0
    • M2M Security
    • Big Data

All authors are required to provide their ORCID. Manuscripts must be prepared and submitted in LaTeX format.

Articles submitted for publication are evaluated by two international reviewers, accept-decline decision is taken by the editorial board. Names of reviewers evaluating the articles arena informed to the authors (Blind peer review). The names of the authors not to be seen by the reviewers (double-blind peer review) is left to the preference of the authors. The authors using this preference should delete the lines of name and address in the article. Depending on the reviewers reports, the decision of major revision or minor revision can be given to the articles which are not seen enough. The articles which are not reached intended level or arena seemed enough in terms of scientific perspective are declined.

The IJISS does not charge any publication or processing fee.