Información de la Revista
International Journal of Information Security
https://link.springer.com/journal/10207
Factor de Impacto:
2.400
Editor:
Springer
ISSN:
1615-5262
Vistas:
8614
Seguidores:
4
Solicitud de Artículos
Aims and scope

The International Journal of Information Security is an English language international journal on research in information security.

Information security builds on computer security and applied cryptography, but also reaches out to other branches of the information sciences. Information security is an important aspect of protecting the information society from a wide variety of threats.

The number and the sizes of international conferences treating information security grow with each passing year, as does the quantity of significant publishable technical work in this area. But much of this work appears too long after the need for it has arisen, if at all, or in journals with specialist readerships not including many of those to whom it would be most valuable. Moreover, we do not have journals covering applications and the implementation of security techniques, topics which are important in industry and the business world.

In this new century, The International Journal of Information Security will provide prompt publication of important technical work in information security, whether theoretical, applicable, or related to implementation.

The intended audience includes any person, whether active in the technology or not, whose interests in communications, commerce, banking, medicine, or other areas of endeavor are affected by information security.

The intended author is a technical specialist with the skill and commitment to presenting recent advances in information security to a broad audience around the world.

The intended review process will be peer review by members of the editorial board, with recourse to outside experts where appropriate.

The scope of the International Journal of Information Security (IJIS) is theory, applications, and implementations of information security. This includes, but is not limited to:

- system security - intrusion detection, secure end systems, secure operating systems, data base security, security infrastructures, security evaluation
- network security - Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures
- content protection - software protection, tamper resistant software
- applications - electronic commerce, electronic government, health, telecommunications, mobility
- foundations - privacy, access control, authentication, identification, applied cryptography, formal methods in information security

Co-founders
G.R. Blakley, College Station, TX, USA
G. Davida, Milwaukee, WI, USA
E. Dawson, Brisbane, Australia
D. Gollmann, Cambridge, UK
C.A. Meadows, Washington, DC, USA
E. Okamoto, Funabashi, Japan
Última Actualización Por Dou Sun en 2024-07-20
Special Issues
Special Issue on Reinforcing Cyber Security of Critical Infrastructures through Digital Twins
Día de Entrega: 2024-10-31

IJIS Special Issue: Reinforcing Cyber Security of Critical Infrastructures through Digital Twins Digital Twins are seen as one of the emerging technologies. In recent years, the conceptualization, development, and implementation of digital twins in different domains is clearly evident. There will be more and more connected devices in use around the world with the evolution of technologies like the Internet of Things. Furthermore, with the emergence of remote access, operators and critical systems are increasingly connected using remote connectivity. At the same time, there is an increased rate of cyber-attacks. These are reasons why cyber security is critically important to contemporary society as these factors make critical infrastructures even more susceptible to cyber-attacks. However, in order to make critical infrastructures cyber-resilient, performing cyber security testing/exercises on real-world systems is impractical. Digital twins in different domains provide the capability to be used for a wide range of cyber security tests. On the other hand, digital twins are susceptible to different types of cyber threats that could lead to negative consequences. This special issue aims to gather high-quality empirical, experimental, and theoretical research reporting original and unpublished results. Digital Twins research relates to multiple United Nations Sustainable Development Goals (SDGs) through advances in cybersecurity, health care, data management, and education, among other fields. This collection particularly welcomes submissions related to SDG 9 “Industry, Innovation, and Infrastructure.” Topics of interest for this special issue include, but are not limited to: • Methods and techniques in the development of digital twins for cyber security • Artificial intelligence and machine learning approaches for digital twins • Enabling technologies for digital twins • Digital twins for security testing • Use of digital twins in the security operations center • Cyber situational awareness through digital twins • Digital twins for attack prediction • Digital twins in cyber risk management • Digital twin-based anomaly detection • Digital twins for decision making in cyber security • Incident response using digital twins • Cyber security training/education via digital twins • Secure data management in digital twins • Human digital twin for cyber security • Cyber security threats in adopting digital twins • Security issues in Condition Monitoring, diagnostics, and prognosis in digital twins • Novel solutions for securing critical components with digital twins. Submitted papers should present original, unpublished work, relevant to one of the topics of the Special Issue. All submitted papers will be evaluated on the basis of relevance, significance of contribution, technical quality, scholarship, and quality of presentation, by at least two independent reviewers. It is the policy of the journal that no submission, or substantially overlapping submission, be published or be under review at another journal or conference at any time during the review process. Schedule Submission Deadline: 31st October 2024 First Round of Review Notification: rolling Revised Paper Submission: rolling Final Decision Notification: rolling Planned Publication: 2025
Última Actualización Por Dou Sun en 2024-07-20
Special Issue on Security and Privacy for IoT and Smart Cities: Recent Advances and Challenges
Día de Entrega: 2024-10-31

Scope A smart city is a newly developed concept, referring to an urban area using different kinds of electronic sensors to collect data and supply information, including data collected from citizens, devices, and assets. It integrates information and communication technology (ICT), various physical devices, and citizen services. To establish a smart city, Internet of Things (IoT) is an important basis, where connected devices in a smart city are not limited to static sensors anymore, but also include any personal wearable devices such as mobile phones, smart watch, smart glasses, etc. It was expected to reach 53.63 million connections in EU by 2025. However, IoT may also bring notable vulnerabilities to smart cities. For example, in late 2021, a group of hackers took down a power grid in a region of western Ukraine to cause the first blackout from a cyber attack. For privacy, around 10,000 households can generate 150 million discrete data points every day. This creates more entry points for hackers and leaves sensitive information vulnerable. Due to these security and privacy issues to IoT-based smart cities, there is a strong need to develop appropriate mechanisms to protect the security and privacy for IoT networks and smart city infrastructures. This special issue intends to gather cutting-edge results on addressing security and privacy issues for IoT-enabled smart cities. The aim is to promote research and learn recent advances in the domain of IoT and smart cities. In particular, the topic of interest includes but is not limited to: Post-quantum security for IoT-enabled smart cities Secure design for IoT and smart cities Side-channel analysis for the security and privacy of IoT-enabled smart cities Security and risk analysis for IoT-enabled smart cities Privacy and anonymization techniques for IoT-enabled smart cities Trust management architectures for IoT-enabled smart cities Lightweight security solutions for IoT-enabled smart cities Sustainability solutions for IoT and smart cities Authentication and access control for IoT-enabled smart cities Innovative security techniques for smart city infrastructure Internet of Things devices and protocols security Cloud computing-based security solutions for IoT-enabled smart cities Critical infrastructures privacy and security for IoT-enabled smart cities Biometric modalities for IoT-enabled smart cities Cyber-attacks detection and prevention systems for IoT-enabled smart cities Interoperable security for smart city planning and applications Blockchain technologies for smart city security and privacy Edge computing for smart city security and privacy Security and Privacy for IoT and Smart Cities research relates to multiple United Nations Sustainable Development Goals (SDGs) through advances in resilient infrastructure, promoting sustainable industrialization, and fostering innovation. This special issue welcomes submissions related to SDG 9 “Industry, Innovation and Infrastructure.” Submission Guidelines: All submissions have to be prepared according to the Guide for Authors as published in the Journal website at https://link.springer.com/journal/10207/submissionguidelines. Authors should submit online by selecting “SI: SP-IoT-Smart” from the “Issues” pull-down menu during the submission process. All contributions must not have been previously published or be under consideration for publication elsewhere. A submission based on conference paper version should add at least 40% new material. Authors are required to attach to the submitted paper their relevant, previously published articles and a summary document explaining the enhancements made in the journal version. All papers will be peer-reviewed by at least three independent reviewers. Requests for additional information should be addressed to the leading guest editor. Important Dates: Submission deadline: October 31, 2024 Initial notification: December 31, 2024 Final Acceptance/rejection notification: April 30, 2025 Guest Editors: Dr. Weizhi Meng (lead) Technical University of Denmark, Denmark E-mail: weme@dtu.dk Prof. Steven Furnell University of Nottingham, UK E-mail: Steven.Furnell@nottingham.ac.uk Prof. Guo Song (IEEE Fellow) The Hong Kong Polytechnic University, Hong Kong E-mail: song.guo@polyu.edu.hk Editor Biography: Weizhi Meng is currently an Associate Professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark (DTU), Denmark. He obtained his Ph.D. degree in Computer Science from the City University of Hong Kong (CityU), Hong Kong. Prior to joining DTU, he worked as a research scientist at the Institute for Infocomm Research, A*STAR, Singapore. His primary research interests are cyber security and intelligent technology in security including intrusion detection, smartphone security, biometric authentication, HCI security, cloud security, trust management, malware detection, blockchain in security, cyber-physical system security and IoT security. He is currently directing the SPTAGE Lab at DTU Compute, DTU, and received the IEEE MGA Young Professionals Achievement Award in 2020 for his contributions to leading activities in Denmark and Region 8. He is the associate editor / editorial board member for many journals such as IEEE TDSC, IJIS, JISA, SCN, WCMC, etc. He was also guest editor for IEEE TII, JSS, FGCS, SCN, WCMC, NCAA, CAEE, CCPE, etc. Steven Furnell is a professor of cyber security at the University of Nottingham in the United Kingdom. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa. His research interests include usability of security and privacy, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 350 papers in refereed international journals and conference proceedings, as well as various books, book chapters and industry reports. Prof. Furnell is the UK representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, as well as the editor-in-chief of Information and Computer Security, and a Fellow and board member of the Chartered Institute of Information Security. Song Guo is a Full Professor at Department of Computing, The Hong Kong Polytechnic University. He also holds a Changjiang Chair Professorship awarded by the Ministry of Education of China. Prof. Guo is a Fellow of the Canadian Academy of Engineering and a Fellow of the IEEE (Computer Society). His research interests are mainly in edge AI, machine learning, mobile computing, and distributed systems. He published many papers in top venues with wide impact in these areas and was recognized as a Highly Cited Researcher (Clarivate Web of Science). He is the recipient of over a dozen Best Paper Awards from IEEE/ACM conferences, journals, and technical committees. Prof. Guo is the Editor-in-Chief of IEEE Open Journal of the Computer Society and the Chair of IEEE Communications Society (ComSoc) Space and Satellite Communications Technical Committee. He was an IEEE ComSoc Distinguished Lecturer and a member of IEEE ComSoc Board of Governors. He has served for IEEE Computer Society on Fellow Evaluation Committee, and been named on editorial board of a number of prestigious international journals like IEEE TPDS, IEEE TCC, IEEE TETC, etc. He has also served as chairs of organizing and technical committees of many international conferences.
Última Actualización Por Dou Sun en 2024-07-20
Revistas Relacionadas
Conferencias Relacionadas
CCFCOREQUALISAbreviaciónNombre CompletoEntregaNotificaciónConferencia
cba1ICIPInternational Conference on Image Processing2024-01-312024-06-062024-10-27
WoTBDInternational Symposium on Web of Things and Big Data2015-08-302015-09-152015-10-06
MSE'International Conference on Materials Science and Engineering2023-04-292023-05-012023-05-13
ICRCCInternational Conference on Radar, Communication and Computing2016-09-152016-09-202016-08-13
CSENInternational Conference on Computer Science and Engineering2022-09-032022-09-102022-09-17
ccb1MMMInternational Conference on MultiMedia Modeling2024-08-192024-10-092025-01-07
ICT4AWEInternational Conference on Information and Communication Technologies for Ageing Well and e-Health2015-12-072016-02-012016-04-21
ICSIPInternational Conference on Signal and Image Processing2022-05-102022-05-302022-07-20
MulGraBInternational Conference on Multimedia, Computer Graphics and Broadcasting2015-06-302015-07-152015-11-25
SSPIEEE Statistical Signal Processing Workshop 2012-04-152012-08-05
Recomendaciones