Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http:///www.dline.info).
The journal aims to be an internationally recognized forum attracting authors and audiences from both the academic and industrial communities. Papers offering original and innovative research contributions in information systems security and related domains are solicited for submission. The primary focus is on original, high quality, and unpublished research- and implementation-related contributions.
The Editor-in-Chief and the Editorial Board of JISR will strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of complete reproducibility of the experimental methods undertaken.
We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to information security. Position papers summarizing advancements in the field are also invited.
Each volume of JISR will be published in electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.
The JISR is published four times a year, with at least one volume dedicated to some specific topic.
The JISR will publish papers in the following themes.
Access Control
Accountability
Anonymity
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Biometrics
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
E-surveillance
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance
Joint signal processing and encryption
Language-based Security
Malicious code detection
Network intruder prevention
Network security
Network/Communications Infrastructures and Architectures for Healthcare
New models for healthcare delivery
Perceptual hashing
Privacy and security
Privacy enhancing technologies (PETs)
Privacy governance
Risk analysis and management
Safety-critical systems
Secure communication technology
Secure computer systems
Secure electronic voting
Security architectures
Security control measures
Security economics
Security for mobile code
Security in location services
Security in social networks
Security models
Security policy models and mechanisms
Security verification
Signal processing in the encrypted domain
Steganography and steganalysis
Transaction security
Trust models and management
Trust theories
Trustworthy user devices
Unauthorised access protection
Virus/worm controls
Web Security
Wireless/mobile network security
|