posted by user: pichappan || 13963 views || tracked by 39 users: [display]

JISR 2012 : Journal of Information Security Research

FacebookTwitterLinkedInGoogle

Link: http://www.dline.info/jisr
 
When N/A
Where N/A
Submission Deadline TBD
Categories    information security   internet   data management   information processing
 

Call For Papers

Journal of Information Security Research (JISR)
ISSN 0976-4143 (Print) ISSN 0976-4151 (Online)


Editorial Board

Editor-in-Chief:
Victor Ralevich
Sheridan Institute of Technology and Advanced Learning, Ontario,
Canada

Submissions at- http://www.dline.info/jisr/submission.php


Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http://
www.dline.info). The journal aims to be an internationally recognized forum attracting authors and audiences from both
the academic and industrial communities. Papers offering original and innovative research contributions in information
systems security and related domains are solicited for submission. The primary focus is on original, high quality, and
unpublished research- and implementation-related contributions. The Editor-in-Chief and the Editorial Board of JISR will
strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of
complete reproducibility of the experimental methods undertaken.


We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to
information security. Position papers summarizing advancements in the field are also invited. Each volume of JISR will be published in
electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Access Control

Accountability
Anonymity
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Biometrics
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
E-surveillance
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance


Review Process

Each paper will be handled by the editor-in-chief, who collects three reviews and makes the decision to (a) accept the paper with minor revisions, (b) accept the paper with major revisions, or (c) reject the paper. The editor-in-chief will communicate with
the author(s) about the decision, and provide reviews. The goal is to provide the first round of reviews within three months of the paper assignment. The authors with papers requesting major revisions should submit the major revisions within one month after they were informed about the decision. Authors who need more time are kindly requested to contact the Editor. The Editor reserves the right to reject
a paper if it does not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it is inadequate
in presentation.

Author Guidelines

Authors should upload full original papers in electronic format at the Journal Management Online System (http://www.dline.info/jisr/
submission.php). The papers should not be longer than 20-25 pages, single column, double space, 10pt font, including figures, tables and
references. If the submitted papers are extensions of existing conference publications, the authors must submit a corresponding letter,
specifying clearly what is new in the journal paper and how the submitted paper distinguishes itself from the published conference paper. We
require in minimum 25% of new material in such a paper. Any submitted paper must not be fully or partially be submitted to another Journal,
Conference, or Workshop! All paper submissions should be ONLY online at http://www.dline.info/jisr/submission.php
Copyright: Authors should transfer the publication rights to the publishers. Contact: For further information please contact director@dline.info


----------------------------------------



Related Resources

RASS 2018   Special issue on Recent Advances in Software Security - EURASIP Journal on Information Security
NECO 2018   7thInternational Conference of Networks and Communications
SCSN 2019   International Workshop on Semantic Computing for Social Networks and Organization Sciences: from user information to social knowledge
IJGCA 2018   International Journal of Grid Computing & Applications
C2SI 2019   3rd International Conference on Codes, Cryptology and Information Security
AVC 2018   Advances in Vision Computing: An International Journal
FI-IoTSP 2018   Future Internet Journal: Special Issue on IoT Security and Privacy
ICCBD--ACM, EI and Scopus 2018   ACM--2018 International Conference on Computing and Big Data (ICCBD 2018)--EI Compendex and Scopus
ECIR 2019   European Conference on Information Retrieval
ACIIDS 2018   10th Asian Conference on Intelligent Information and Database Systems