万维提示:
1、投稿方式:在线投稿。
2、期刊网址:
https://www.journals.elsevier.com/journal-of-information-security-and-applications
https://www.sciencedirect.com/journal/journal-of-information-security-and-applications
3、投稿网址:
https://www.editorialmanager.com/jisas/default.aspx
4、期刊刊期:一年出版8期。
2021年11月23日星期二
投稿须知【官网信息】
Guide for Authors
Aims and scope
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA.
JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications.
Current JISA topics
Authentication and access control
Anonymity and privacy
Cryptographic protection
Digital forensics
Human factors in security
Multimedia security
Network and mobile security
Security management and policies
Hardware and physical security
Journal of Information Security and Applications is a quarterly technical report, focused on a specific topic. It is aimed at senior information security managers, who need to gain a better understanding of current information security issues and solutions, and provides 'off-the shelf' consultancy from professional researchers and practitioners.
The main objective of the report is to provide a balanced, impartial, up to date, and authoritative view of specific topics within the information security arena.
Submission checklist
You can use this list to carry out a final check of your submission before you send it to the journal for review. Please check the relevant section in this Guide for Authors for more details.
Ensure that the following items are present:
One author has been designated as the corresponding author with contact details:
• E-mail address
• Full postal address
All necessary files have been uploaded:
Manuscript:
• Include keywords
• All figures (include relevant captions)
• All tables (including titles, description, footnotes)
• Ensure all figure and table citations in the text match the files provided
• Indicate clearly if color should be used for any figures in print
Graphical Abstracts / Highlights files (where applicable)
Supplemental files (where applicable)
Further considerations
• Manuscript has been 'spell checked' and 'grammar checked'
• All references mentioned in the Reference List are cited in the text, and vice versa
• Permission has been obtained for use of copyrighted material from other sources (including the Internet)
• A competing interests statement is provided, even if the authors have no competing interests to declare
• Journal policies detailed in this guide have been reviewed
• Referee suggestions and contact details provided, based on journal requirements
……
更多详情:
https://www.elsevier.com/journals/journal-of-information-security-and-applications/2214-2126/guide-for-authors