Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 0976-4143
Online ISSN:

  About JISR
  DLINE Portal Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Sample Issue
Upcoming Conferences
Self-archiving policy
Alert Services
Be a Reviewer
Paper Submission
Contact us
  How To Order
  Order Online
Price Information
Request for Complimentary
Print Copy
  For Authors
  Guidelines for Contributors
Online Submission
Call for Papers
Author Rights
Journal of Digital Information Management (JDIM)
International Journal of Computational Linguistics Research (IJCL)
International Journal of Web Application (IJWA)


Journal of Information Security Research
Aim and Scope


Journal of Information Security Research (JISR) is a peer reviewed scholarly publication of the DLINE (http:///www.dline.info).

The journal aims to be an internationally recognized forum attracting authors and audiences from both the academic and industrial communities. Papers offering original and innovative research contributions in information systems security and related domains are solicited for submission. The primary focus is on original, high quality, and unpublished research- and implementation-related contributions.

The Editor-in-Chief and the Editorial Board of JISR will strive to attract the authors who, in their papers, demonstrate highest level of scientific rigour and provide assurance of complete reproducibility of the experimental methods undertaken.

We also encourage submission of papers discussing industrial research and development, as well as social and legal issues related to information security. Position papers summarizing advancements in the field are also invited.

Each volume of JISR will be published in electronic and printed formats, and will consist of: editorials and peer-reviewed high quality research and position papers.

The JISR is published four times a year, with at least one volume dedicated to some specific topic. 

The JISR will publish papers in the following themes.

Access Control
Applied Cryptography
Assurance of service
Attacks and Viral Software
Authentication and Delegation
Computer crime prevention and detection
Computer forensics
Computer security
Confidentiality protection
Critical infrastructure security issues
Cryptography and data protection
Data hiding
Data Integrity
Database and data security
Digital forensics
Digital rights management
E-commerce security
IS Security Education
e-Health for Public Health
IS Security and ethics
Formal Security Methods
Fraud detection and prevention
Hacker and terrorist detection
Identity Management
Information ethics
Information privacy issues
Information system security
Information warfare
Internet security
Intrusion tolerance
Joint signal processing and encryption
Language-based Security
Malicious code detection
Network intruder prevention
Network security
Network/Communications Infrastructures and Architectures for Healthcare
New models for healthcare delivery
Perceptual hashing
Privacy and security
Privacy enhancing technologies (PETs)
Privacy governance
Risk analysis and management
Safety-critical systems
Secure communication technology
Secure computer systems
Secure electronic voting
Security architectures
Security control measures
Security economics
Security for mobile code
Security in location services
Security in social networks
Security models
Security policy models and mechanisms
Security verification
Signal processing in the encrypted domain
Steganography and steganalysis
Transaction security
Trust models and management
Trust theories
Trustworthy user devices
Unauthorised access protection
Virus/worm controls
Web Security
Wireless/mobile network security


Home | Aim & Scope | Editorial Board | Author Guidelines | Publisher | Subscription | Previous Issue | Contact Us |Upcoming Conferences|Sample Issues|Library Recommendation Form|


Copyright 2011 dline.info