posted by user: pichappan || 14570 views || tracked by 39 users: [display]

JISR 2012 : Journal of Information Security Research

FacebookTwitterLinkedInGoogle

Link: http://www.dline.info/jisr
 
When N/A
Where N/A
Submission Deadline TBD
Categories    information security   internet   data management   information processing
 

Call For Papers

Journal of Information Security Research (JISR)
ISSN 0976-4143 (Print) ISSN 0976-4151 (Online)


Editorial Board

Editor-in-Chief:
Victor Ralevich
Sheridan Institute of Technology and Advanced Learning, Ontario,
Canada

Submissions at- http://www.dline.info/jisr/submission.php


Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http://
www.dline.info). The journal aims to be an internationally recognized forum attracting authors and audiences from both
the academic and industrial communities. Papers offering original and innovative research contributions in information
systems security and related domains are solicited for submission. The primary focus is on original, high quality, and
unpublished research- and implementation-related contributions. The Editor-in-Chief and the Editorial Board of JISR will
strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of
complete reproducibility of the experimental methods undertaken.


We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to
information security. Position papers summarizing advancements in the field are also invited. Each volume of JISR will be published in
electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Access Control

Accountability
Anonymity
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Biometrics
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
E-surveillance
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance


Review Process

Each paper will be handled by the editor-in-chief, who collects three reviews and makes the decision to (a) accept the paper with minor revisions, (b) accept the paper with major revisions, or (c) reject the paper. The editor-in-chief will communicate with
the author(s) about the decision, and provide reviews. The goal is to provide the first round of reviews within three months of the paper assignment. The authors with papers requesting major revisions should submit the major revisions within one month after they were informed about the decision. Authors who need more time are kindly requested to contact the Editor. The Editor reserves the right to reject
a paper if it does not meet the aims and scope of the journal, it is not technically sound, it is not revised satisfactorily, or if it is inadequate
in presentation.

Author Guidelines

Authors should upload full original papers in electronic format at the Journal Management Online System (http://www.dline.info/jisr/
submission.php). The papers should not be longer than 20-25 pages, single column, double space, 10pt font, including figures, tables and
references. If the submitted papers are extensions of existing conference publications, the authors must submit a corresponding letter,
specifying clearly what is new in the journal paper and how the submitted paper distinguishes itself from the published conference paper. We
require in minimum 25% of new material in such a paper. Any submitted paper must not be fully or partially be submitted to another Journal,
Conference, or Workshop! All paper submissions should be ONLY online at http://www.dline.info/jisr/submission.php
Copyright: Authors should transfer the publication rights to the publishers. Contact: For further information please contact director@dline.info


----------------------------------------



Related Resources

SIGIR 2019   International ACM SIGIR Conference on Research and Development in Information Retrieval
NECO 2018   7th International Conference of Networks and Communications
ACISP 2019   The 24th Australasian Conference on Information Security and Privacy
SCAI 2018   7th International Conference On Soft Computing, Artificial Intelligence And Applications
IFIPSEC 2019   IFIP Information Security Conference & Privacy Conference - IFIP Technical Commitee 11
ICKD 2018   2018 7th International Conference on Knowledge Discovery (ICKD 2018)
MLCS-MDPI 2019   Special issue on Machine Learning for Cyber-Security (MDPI Journal of INFORMATION)
IJGCA 2018   International Journal of Grid Computing & Applications
ICINT--EI, Scopus 2019   2019 4th International Conference on Information and Network Technologies (ICINT 2019)--EI Compendex, Scopus
CyberHunt - 2018   International Workshop on Big Data Analytics for Cyber Threat Hunting