Volume: 10 Issue: 4, 12/31/21

Year: 2021

Articles

Research Article

The scope of IJISS comprises original research on all aspects of security science, engineering and technology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. The IJISS does not charge any publication or processing fee.

IJISS is published 4 times in a year. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication.

Manuscripts previously published in another journal are not accepted. Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted.

A review article is expected to give in-depth information and satisfying evaluation of a topic supported with an extensive list of sources.

Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.

The coverage of IJISS includes the following topics, but not limited to: cryptology, information security, network security, cyber security and secure coding theory.


The Journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering.

The Journal is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. The IJISS does not charge any publication or processing fee. The Journal currently has an acceptance rate of 17%. The Journal has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, CNKI, Index Copernicus, AE Global, Google Index, so far.

The coverage of IJISS includes the following topics, but not limited to:
  • Cyber security
  • Blockchain
  • Cryptocurrencies
  • Securing Networks, Computers, Services, Systems, Databases
  • Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
  • Information Security Science (ISS) and Engineering
  • Cryptographic software and hardware for embedded systems,
  • Coding theory and applications of finite fields and elliptic curves to cryptography
  • Post-quantum cryptography
  • Artificial Intelligence Techniques for ISS and Engineering
  • Smart Card, RFID, NFC, Security of 3G, 4G, 5G, 6G, etc.
  • Recent Theory, Trends, Technologies and Applications in ISS
  • Security Risk Analysis, Modelling, Evaluation and Management
  • Security Weaknesses on Information and Communication
  • Secure Coding, Source Code Auditing and Review
  • Critical Information and Infrastructure Security
  • Security Standards, Protocols and Policies
  • Key and Identity Management Trust Models
  • Mobile Communication and Application Security
  • Data Privacy, Privacy Theory and Engineering
  • e-Governance and e-Government Security
  • Cryptography and Cryptoanalysis
  • Steganography and Steganalysis
  • Operating System Security
  • Clouds and Virtual Machine Security
  • E-Sign and Public Key Infrastructure
  • Securing Mobile Networks and Devices
  • Wireless, Ad Hoc and Sensor Network Security
  • Web and Web Application Security
  • Information Security Audits
  • Securing Digital Rights and Management
  • Penetration Tests, Tools and Techniques
  • Social Engineering Attacks and Prevention
  • Intrusion Detection and Prevention Systems
  • Content Protection
  • Malicious Software Threats and Protection
  • Public Awareness and Education for ISS
  • Future Directions and Challenges in ISS
  • Etichal Hacking
  • Software Security
  • Biometrics
  • Cyber security, Warefare, Defense and policies
  • IoT and Industry 4.0
  • M2M Security
  • Big Data

The IJISS does not charge any publication or processing fee. Starting July 2018, all authors are required to provide their ORCID. Manuscripts must be prepared and submitted in LaTeX format.

Submission Preparation Checklist

  • As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.
  • The submission has not been previously published, nor submitted to another journal for consideration (or an explanation has been provided in Comments to the Editor).
  • Manuscripts must be prepared and submitted in LaTeX format. The submission should be in pdf format.
  • Where available, URLs for the references have been provided.
  • The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  • The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines, which is found in About the Journal.
  • If submitting to a peer-reviewed section of the journal, the instructions in Ensuring a Blind Review have been followed.

Peer Review Process
Articles submitted for publication are evaluated by two international reviewers, accept-decline decision is taken by the editorial board. Names of reviewers evaluating the articles arena informed to the authors (Blind peer review). The names of the authors not to be seen by the reviewers (double-blind peer review) is left to the preference of the authors. The authors using this preference should delete the lines of name and address in the article. Depending on the reviewers reports, the decision of major revision or minor revision can be given to the articles which are not seen enough. The articles which are not reached intended level or arena seemed enough in terms of scientific perspective are declined.

Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Archiving
This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.

The IJISS does not charge any publication or processing fee.