Cilt: 13 Sayı: 2, 30.06.2024

Yıl: 2024

Aim
The scope of IJISS comprises original research on all aspects of security science, engineering and technology. Original research results, scientific reviews and short communication notes in various fields of security science and technology are considered for publication. The publication language of the journal is English. The IJISS does not charge any publication or processing fee.

IJISS is published 4 times in a year. Original research results, applications, implementations, scientific reviews and short communication notes in information security science and technology are considered for publication. Manuscripts previously published in another journal are not accepted. Manuscripts with a suitable balance of practice and theory, pure theory or applications are accepted.  Original research articles, review articles, and research notes/short communications are welcome. The editor-in-chief can change the manuscript type after manuscript submission.
  • Research Articles: A research article reports the results of original research and assesses its contribution to the body of knowledge in a given area with the relevant data and findings in an orderly, logical manner. Research articles should have an abstract of 300 words at most, should contain a limit of 75 references, and should have no more than 15 figures and tables combined.
  • Review Articles: A review article is written to summarize the recent developments, improvements, discoveries, and ideas in various subjects. Review articles should present an unbiased summary of the current understanding of the topic.
  • Short communication notes are also accepted to share the first outcomes of researchers' on-going original research work.

Scope
The International Journal of Information Security Science is published electronically and it accepts English-language manuscripts in the areas of
  • Cyber security
  • Blockchain
  • Cryptocurrencies
  • Securing Networks, Computers, Services, Systems, Databases
  • Digital Forensics, Procedures, Tools, Techniques, Surveillance Technology
  • Information Security Science (ISS) and Engineering
  • Cryptographic software and hardware for embedded systems,
  • Coding theory and applications of finite fields and elliptic curves to cryptography
  • Post-quantum cryptography
  • Artificial Intelligence Techniques for ISS and Engineering
  • Smart Card, RFID, NFC, Security of 3G, 4G, 5G, 6G, etc.
  • Recent Theory, Trends, Technologies and Applications in ISS
  • Security Risk Analysis, Modelling, Evaluation and Management
  • Security Weaknesses on Information and Communication
  • Secure Coding, Source Code Auditing and Review
  • Critical Information and Infrastructure Security
  • Security Standards, Protocols and Policies
  • Key and Identity Management Trust Models
  • Mobile Communication and Application Security
  • Data Privacy, Privacy Theory and Engineering
  • e-Governance and e-Government Security
  • Cryptography and Cryptoanalysis
  • Steganography and Steganalysis
  • Operating System Security
  • Clouds and Virtual Machine Security
  • E-Sign and Public Key Infrastructure
  • Securing Mobile Networks and Devices
  • Wireless, Ad Hoc and Sensor Network Security
  • Web and Web Application Security
  • Information Security Audits
  • Securing Digital Rights and Management
  • Penetration Tests, Tools and Techniques
  • Social Engineering Attacks and Prevention
  • Intrusion Detection and Prevention Systems
  • Content Protection
  • Malicious Software Threats and Protection
  • Public Awareness and Education for ISS
  • Future Directions and Challenges in ISS
  • Etichal Hacking
  • Software Security
  • Biometrics
  • Cyber security, Warefare, Defense and policies
  • IoT and Industry 4.0
  • M2M Security
  • Big Data
Contribution is open to researchers of all nationalities. 

The Journal is established to keep you informed about recent developments, techniques and technologies in information security science and engineering. The Journal is a quarterly published journal and operates an online submission and peer review system allowing authors to submit articles online and track their progress via its online website. The IJISS does not charge any publication or processing fee. The Journal currently has an acceptance rate of 17%. The Journal has been indexed by ULAKBIM TR Dizin, EBSCO, CNKI, DOAJ, CiteFactor, WorldCat, CNKI, Index Copernicus, AE Global, Google Index, so far.



The IJISS does not charge any publication or processing fee. Starting July 2018, all authors need to send their ORCID iDs so that the process of evaluation and publishing of the manuscripts can continue in accordance with our publishing policy. Authors can visit https://orcid.org/ to get a unique 16-digit ORCID iD number.

Preparation of Manuscript

Manuscripts that are not prepared using the template will not be considered for publication. Manuscripts must be prepared and submitted in LATEX (in one file download) format. The citations should be given via “cite” command during the preparation of LaTeX file, not given in square brackets manually.
In order to compile your document ijiss main.tex without errors and to get the orcid logo under the title, make sure that the orcidlogo.pdf is in the folder you are working in. Note that orcidlogo. pdf, ijiss main.text, ijiss.cls, references.bib and your supplementary files like figures must be in the same folder.


Submission
All manuscripts must be submitted electronically via the Internet through the online system for DergiPark journals at https://dergipark.org.tr/tr/. After selecting the journal, you will be guided stepwise through the creation and uploading of the various files. Papers are accepted for evaluation on the understanding that:
  • They have not been published,
  • They are not being considered for publication simultaneously elsewhere,
  • They are not going to be submitted for publication elsewhere.
Authors should certify that neither the manuscript nor its main contents have already been published or submitted for publication in another journal. The copyright release form, which can be found at copyright must be signed by the corresponding author on behalf of all authors and must accompany all papers submitted. Please see the form for additional copyright details.

Revision 

In resubmission process, the authors should submit three files:

1. A clean updated manuscript without highlights

2. An updated manuscript with yellow/red/blue highlighting indicating changes

3. Response letter to the reviewers (point-by-point response to the comment. response_letter_template)

Ethical Issues-Conflicts of Interest
The International Committee of Medical Journal Editors definition of conflicts of interest is as follows: “A conflict of interest exists when professional judgment concerning a primary interest (such as patients’ welfare or the validity of research) may be influenced by a secondary interest (such as financial gain). Perceptions of conflict of interest are as important as actual conflicts of interest.” A conflict of interest defines the situations that might raise the question of bias, direct or indirect, in the work reported. These situations occur when an individual’s objectivity is potentially compromised by a desire for financial gain, prominence, professional advancement, or a successful outcome. Conflicts can also arise for other reasons, such as personal relationships or rivalries, academic competition, and intellectual beliefs. Authors should avoid entering into agreements with study sponsors, both forprofit and nonprofit, that interfere with authors’ access to all of the study’s data or that interfere with their ability to analyze and interpret. In order to preserve the reliability of the IJISS journal, authors are required to disclose all and any potential conflicts of interest when they submit their manuscripts.

Conflicts of interest are the most likely to undermine the credibility of the journal, the authors, and science itself. That is why our editors are working diligently to ensure that what is published in our journals is balanced, evidence-based, and evaluated independently. In this manner, Subject Editors and reviewers are required to notify the journal if they find they do not have the necessary expertise to assess the relevant aspects of a manuscript, if they decide that the manuscript is very similar to one in preparation or under consideration by another journal, or if they suspect the identity of the author(s), which raises potential competing or conflicting interests.

Peer Review Process
Articles submitted for publication are evaluated by two international reviewers, accept-decline decision is taken by the editorial board. Names of reviewers evaluating the articles arena informed to the authors (Blind peer review). The names of the authors not to be seen by the reviewers (double-blind peer review) is left to the preference of the authors. The authors using this preference should delete the lines of name and address in the article. Depending on the reviewers reports, the decision of major revision or minor revision can be given to the articles which are not seen enough. The articles which are not reached intended level or arena seemed enough in terms of scientific perspective are declined.

Open Access Policy
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.

Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Archiving
This journal utilizes the LOCKSS system to create a distributed archiving system among participating libraries and permits those libraries to create permanent archives of the journal for purposes of preservation and restoration.


Submission and Evaluation Process
    1. Submission
    2. First Control

        a. Scope check
        b. Preliminary language check and technical control
    3. Scientific Evaluation
        a. Editor-in-chief
        b. Editor
        c. Referee
    4. Publication
        a. Technical control
        b. After acceptance language correction
        c. Galley proof
        d. Publication

Technical Control
During the first check, journal administrators may return the articles for the following reasons:
  • The manuscript is not prepared in the format provided on the journal’s website,
  • The manuscript file is not the same as the manuscript template file given on the journal’s website,
  • The order and format of the names of the authors in the manuscript are not consistent with those on the copyright form,
  • The authors did not perform the requested corrections or provide the necessary documents within the requested time,
  • Similarity index is higher than the permitted threshold. There is no single number for the similarity percentage since each report is investigated in detail, but submissions exceeding 30% score are generally returned to authors. The submission of the same title without reducing the similarity score may cause a ban of the authors from the journal. 

The IJISS does not charge any publication or processing fee.