Example of International Journal of Information and Computer Security format
Recent searches

Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
Look Inside
Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format Example of International Journal of Information and Computer Security format
Sample paper formatted on SciSpace - SciSpace
This content is only for preview purposes. The original open access content can be found here.
open access Open Access

International Journal of Information and Computer Security — Template for authors

Categories Rank Trend in last 3 yrs
Safety, Risk, Reliability and Quality #121 of 165 down down by 2 ranks
Computer Networks and Communications #268 of 334 down down by 36 ranks
Software #342 of 389 up up by 3 ranks
Hardware and Architecture #142 of 157 down down by 4 ranks
journal-quality-icon Journal quality:
Medium
calendar-icon Last 4 years overview: 122 Published Papers | 113 Citations
indexed-in-icon Indexed in: Scopus
last-updated-icon Last updated: 18/06/2020
Related journals
Insights
General info
Top papers
Popular templates
Get started guide
Why choose from SciSpace
FAQ

Related Journals

open access Open Access
recommended Recommended

IEEE

Quality:  
High
CiteRatio: 10.8
SJR: 1.075
SNIP: 2.756
open access Open Access

Frontiers Media

Quality:  
High
CiteRatio: 6.2
SJR: 0.427
SNIP: 1.319
open access Open Access

Springer

Quality:  
High
CiteRatio: 5.0
SJR: 0.445
SNIP: 1.076
open access Open Access

Elsevier

Quality:  
High
CiteRatio: 5.7
SJR: 0.61
SNIP: 1.727

Journal Performance & Insights

CiteRatio

SCImago Journal Rank (SJR)

Source Normalized Impact per Paper (SNIP)

A measure of average citations received per peer-reviewed paper published in the journal.

Measures weighted citations received by the journal. Citation weighting depends on the categories and prestige of the citing journal.

Measures actual citations received relative to citations expected for the journal's category.

0.9

13% from 2019

CiteRatio for International Journal of Information and Computer Security from 2016 - 2020
Year Value
2020 0.9
2019 0.8
2018 0.5
2017 0.5
2016 0.4
graph view Graph view
table view Table view

0.153

17% from 2019

SJR for International Journal of Information and Computer Security from 2016 - 2020
Year Value
2020 0.153
2019 0.185
2018 0.144
2017 0.141
2016 0.13
graph view Graph view
table view Table view

0.532

10% from 2019

SNIP for International Journal of Information and Computer Security from 2016 - 2020
Year Value
2020 0.532
2019 0.485
2018 0.783
2017 0.44
2016 0.13
graph view Graph view
table view Table view

insights Insights

  • CiteRatio of this journal has increased by 13% in last years.
  • This journal’s CiteRatio is in the top 10 percentile category.

insights Insights

  • SJR of this journal has decreased by 17% in last years.
  • This journal’s SJR is in the top 10 percentile category.

insights Insights

  • SNIP of this journal has increased by 10% in last years.
  • This journal’s SNIP is in the top 10 percentile category.

International Journal of Information and Computer Security

Guideline source: View

All company, product and service names used in this website are for identification purposes only. All product names, trademarks and registered trademarks are property of their respective owners.

Use of these names, trademarks and brands does not imply endorsement or affiliation. Disclaimer Notice

Inderscience Publishers

International Journal of Information and Computer Security

Approved by publishing and review experts on SciSpace, this template is built as per for International Journal of Information and Computer Security formatting guidelines as mentioned in Inderscience Publishers author instructions. The current version was created on 18 Jun 2020 and has been used by 291 authors to write and format their manuscripts to this journal.

i
Last updated on
18 Jun 2020
i
ISSN
1744-1765
i
Impact Factor
Medium - 0.524
i
Open Access
No
i
Sherpa RoMEO Archiving Policy
Yellow faq
i
Plagiarism Check
Available via Turnitin
i
Endnote Style
Download Available
i
Bibliography Name
plainnat
i
Citation Type
Author Year
(Blonder et al., 1982)
i
Bibliography Example
Blonder, G. E., Tinkham, M., and Klapwijk, T. M. (1982). ‘Transition from metallic to tunneling regimes in superconducting microconstrictions: Excess current, charge imbalance, and supercurrent conversion’. Phys. Rev. B, Vol 25, No 7, pp.4515–4532.

Top papers written in this journal

open accessOpen access Journal Article DOI: 10.1504/IJICS.2007.012248
A taxonomy of intrusion response systems
Natalia Stakhanova1, Samik Basu1, Johnny Wong1

Abstract:

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic respon... Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated. In this work we present a taxonomy of intrusion response systems, together with a review of current trends in intrusion response research. We also provide a set of essential features as a requirement for an ideal intrusion response system. read more read less

Topics:

Anomaly-based intrusion detection system (68%)68% related to the paper, Intrusion detection system (65%)65% related to the paper
View PDF
188 Citations
open accessOpen access Journal Article DOI: 10.1504/IJICS.2010.031858
Honeypot detection in advanced botnet attacks
Ping Wang1, Lei Wu1, R. Cunningham1, Cliff C. Zou1

Abstract:

Botnets have become one of the major attacks in the internet today due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defence systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet memb... Botnets have become one of the major attacks in the internet today due to their illicit profitable financial gain. Meanwhile, honeypots have been successfully deployed in many computer security defence systems. Since honeypots set up by security defenders can attract botnet compromises and become spies in exposing botnet membership and botnet attacker behaviours, they are widely used by security defenders in botnet defence. Therefore, attackers constructing and maintaining botnets will be forced to find ways to avoid honeypot traps. In this paper, we present a hardware and software independent honeypot detection methodology based on the following assumption: security professionals deploying honeypots have a liability constraint such that they cannot allow their honeypots to participate in real attacks that could cause damage to others, while attackers do not need to follow this constraint. Attackers could detect honeypots in their botnets by checking whether compromised machines in a botnet can successfully send out unmodified malicious traffic. Based on this basic detection principle, we present honeypot detection techniques to be used in both centralised botnets and Peer-to-Peer (P2P) structured botnets. Experiments show that current standard honeypots and honeynet programs are vulnerable to the proposed honeypot detection techniques. At the end, we discuss some guidelines for defending against general honeypot-aware attacks. read more read less

Topics:

Mariposa botnet (67%)67% related to the paper, Rustock botnet (65%)65% related to the paper, Srizbi botnet (64%)64% related to the paper, Cutwail botnet (63%)63% related to the paper, Botnet (63%)63% related to the paper
View PDF
85 Citations
Journal Article DOI: 10.1504/IJICS.2007.012246
Software fault tree and coloured Petri net based specification, design and implementation of agent-based intrusion detection systems
Guy Helmer1, Johnny Wong1, Mark Slagell1, Vasant Honavar1, Les Miller1, Yanxin Wang1, Xia Wang1, Natalia Stakhanova1

Abstract:

The integration of Software Fault Tree (SFT), which describes intrusions and Coloured Petri Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The IDS under development is a collection of mobile agents that detect, classify, and correlate the system and network activities. SFTs, augmented ... The integration of Software Fault Tree (SFT), which describes intrusions and Coloured Petri Nets (CPNs) that specifies design, is examined for an Intrusion Detection System (IDS). The IDS under development is a collection of mobile agents that detect, classify, and correlate the system and network activities. SFTs, augmented with nodes that describe trust, temporal and contextual relationships, are used to describe intrusions. CPNs for intrusion detection are built using CPN templates created from the augmented SFTs. Hierarchical CPNs are created to detect critical stages of intrusions. The agentbased implementation of the IDS is then constructed from the CPNs. Examples of intrusions and descriptions of the prototype implementation are used to demonstrate how the CPN approach has been used in the development of the IDS. The main contribution of this paper is an approach to systematic specification, design and implementation of an IDS; Innovations include (1) using stages of intrusions to structure the specification and design of the IDS; (2) augmentation of SFT with trust, temporal and contextual nodes to model intrusions; (3) algorithmic construction of CPNs from augmented SFT; and (4) generation of mobile agents from CPNs. read more read less

Topics:

Intrusion detection system (60%)60% related to the paper, Coloured Petri net (54%)54% related to the paper, Petri net (53%)53% related to the paper
View PDF
66 Citations
Journal Article DOI: 10.1504/IJICS.2008.022488
Privacy-preserving data mining in the malicious model
Murat Kantarcioglu1, Onur Kardes2

Abstract:

Most of the cryptographic work in privacy-preserving distributed data mining deals with semi-honest adversaries, which are assumed to follow the prescribed protocol but try to infer private information using the messages they receive during the protocol. Although the semi-honest model is reasonable in some cases, it is unreal... Most of the cryptographic work in privacy-preserving distributed data mining deals with semi-honest adversaries, which are assumed to follow the prescribed protocol but try to infer private information using the messages they receive during the protocol. Although the semi-honest model is reasonable in some cases, it is unrealistic to assume that adversaries will always follow the protocols exactly. In particular, malicious adversaries could deviate arbitrarily from their prescribed protocols. Secure protocols that are developed against malicious adversaries require utilisation of complex techniques. Clearly, protocols that can withstand malicious adversaries provide more security. However, there is an obvious trade-off: protocols that are secure against malicious adversaries are generally more expensive than those secure against semi-honest adversaries only. In this paper, our goal is to make an analysis of trade-offs between performance and security in privacy-preserving distributed data mining algorithms in the two models. In order to make a realistic comparison, we enhance commonly used subprotocols that are secure in the semi-honest model with zero knowledge proofs to be secure in the malicious model. We compare the performance of these protocols in both models. read more read less

Topics:

Security policy (60%)60% related to the paper, Secure multi-party computation (55%)55% related to the paper, Cryptography (53%)53% related to the paper
View PDF
56 Citations
Journal Article DOI: 10.1504/IJICS.2007.013957
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach
Lalit Kumar Awasthi1, Prashant Kumar1

Abstract:

Coordinated checkpointing is a method that minimises number of processes to checkpoint for an initiation. It may require blocking of processes, extra synchronisation messages or useless checkpoints. We propose a minimum process coordinated checkpointing algorithm where the number of useless checkpoints and blocking are reduce... Coordinated checkpointing is a method that minimises number of processes to checkpoint for an initiation. It may require blocking of processes, extra synchronisation messages or useless checkpoints. We propose a minimum process coordinated checkpointing algorithm where the number of useless checkpoints and blocking are reduced using a probabilistic approach that computes an interacting set of processes on checkpoint initiation. A process checkpoints if the probability that it will get a checkpoint request in current initiation is high. A few processes may be blocked but they can continue their normal computation and may send messages. We also modified methodology to maintain exact dependencies. read more read less

Topics:

Blocking (computing) (52%)52% related to the paper
41 Citations
Author Pic

SciSpace is a very innovative solution to the formatting problem and existing providers, such as Mendeley or Word did not really evolve in recent years.

- Andreas Frutiger, Researcher, ETH Zurich, Institute for Biomedical Engineering

Get MS-Word and LaTeX output to any Journal within seconds
1
Choose a template
Select a template from a library of 40,000+ templates
2
Import a MS-Word file or start fresh
It takes only few seconds to import
3
View and edit your final output
SciSpace will automatically format your output to meet journal guidelines
4
Submit directly or Download
Submit to journal directly or Download in PDF, MS Word or LaTeX

(Before submission check for plagiarism via Turnitin)

clock Less than 3 minutes

What to expect from SciSpace?

Speed and accuracy over MS Word

''

With SciSpace, you do not need a word template for International Journal of Information and Computer Security.

It automatically formats your research paper to Inderscience Publishers formatting guidelines and citation style.

You can download a submission ready research paper in pdf, LaTeX and docx formats.

Time comparison

Time taken to format a paper and Compliance with guidelines

Plagiarism Reports via Turnitin

SciSpace has partnered with Turnitin, the leading provider of Plagiarism Check software.

Using this service, researchers can compare submissions against more than 170 million scholarly articles, a database of 70+ billion current and archived web pages. How Turnitin Integration works?

Turnitin Stats
Publisher Logos

Freedom from formatting guidelines

One editor, 100K journal formats – world's largest collection of journal templates

With such a huge verified library, what you need is already there.

publisher-logos

Easy support from all your favorite tools

International Journal of Information and Computer Security format uses plainnat citation style.

Automatically format and order your citations and bibliography in a click.

SciSpace allows imports from all reference managers like Mendeley, Zotero, Endnote, Google Scholar etc.

Frequently asked questions

1. Can I write International Journal of Information and Computer Security in LaTeX?

Absolutely not! Our tool has been designed to help you focus on writing. You can write your entire paper as per the International Journal of Information and Computer Security guidelines and auto format it.

2. Do you follow the International Journal of Information and Computer Security guidelines?

Yes, the template is compliant with the International Journal of Information and Computer Security guidelines. Our experts at SciSpace ensure that. If there are any changes to the journal's guidelines, we'll change our algorithm accordingly.

3. Can I cite my article in multiple styles in International Journal of Information and Computer Security?

Of course! We support all the top citation styles, such as APA style, MLA style, Vancouver style, Harvard style, and Chicago style. For example, when you write your paper and hit autoformat, our system will automatically update your article as per the International Journal of Information and Computer Security citation style.

4. Can I use the International Journal of Information and Computer Security templates for free?

Sign up for our free trial, and you'll be able to use all our features for seven days. You'll see how helpful they are and how inexpensive they are compared to other options, Especially for International Journal of Information and Computer Security.

5. Can I use a manuscript in International Journal of Information and Computer Security that I have written in MS Word?

Yes. You can choose the right template, copy-paste the contents from the word document, and click on auto-format. Once you're done, you'll have a publish-ready paper International Journal of Information and Computer Security that you can download at the end.

6. How long does it usually take you to format my papers in International Journal of Information and Computer Security?

It only takes a matter of seconds to edit your manuscript. Besides that, our intuitive editor saves you from writing and formatting it in International Journal of Information and Computer Security.

7. Where can I find the template for the International Journal of Information and Computer Security?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Information and Computer Security's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

8. Can I reformat my paper to fit the International Journal of Information and Computer Security's guidelines?

Of course! You can do this using our intuitive editor. It's very easy. If you need help, our support team is always ready to assist you.

9. International Journal of Information and Computer Security an online tool or is there a desktop version?

SciSpace's International Journal of Information and Computer Security is currently available as an online tool. We're developing a desktop version, too. You can request (or upvote) any features that you think would be helpful for you and other researchers in the "feature request" section of your account once you've signed up with us.

10. I cannot find my template in your gallery. Can you create it for me like International Journal of Information and Computer Security?

Sure. You can request any template and we'll have it setup within a few days. You can find the request box in Journal Gallery on the right side bar under the heading, "Couldn't find the format you were looking for like International Journal of Information and Computer Security?”

11. What is the output that I would get after using International Journal of Information and Computer Security?

After writing your paper autoformatting in International Journal of Information and Computer Security, you can download it in multiple formats, viz., PDF, Docx, and LaTeX.

12. Is International Journal of Information and Computer Security's impact factor high enough that I should try publishing my article there?

To be honest, the answer is no. The impact factor is one of the many elements that determine the quality of a journal. Few of these factors include review board, rejection rates, frequency of inclusion in indexes, and Eigenfactor. You need to assess all these factors before you make your final call.

13. What is Sherpa RoMEO Archiving Policy for International Journal of Information and Computer Security?

SHERPA/RoMEO Database

We extracted this data from Sherpa Romeo to help researchers understand the access level of this journal in accordance with the Sherpa Romeo Archiving Policy for International Journal of Information and Computer Security. The table below indicates the level of access a journal has as per Sherpa Romeo's archiving policy.

RoMEO Colour Archiving policy
Green Can archive pre-print and post-print or publisher's version/PDF
Blue Can archive post-print (ie final draft post-refereeing) or publisher's version/PDF
Yellow Can archive pre-print (ie pre-refereeing)
White Archiving not formally supported
FYI:
  1. Pre-prints as being the version of the paper before peer review and
  2. Post-prints as being the version of the paper after peer-review, with revisions having been made.

14. What are the most common citation types In International Journal of Information and Computer Security?

The 5 most common citation types in order of usage for International Journal of Information and Computer Security are:.

S. No. Citation Style Type
1. Author Year
2. Numbered
3. Numbered (Superscripted)
4. Author Year (Cited Pages)
5. Footnote

15. How do I submit my article to the International Journal of Information and Computer Security?

It is possible to find the Word template for any journal on Google. However, why use a template when you can write your entire manuscript on SciSpace , auto format it as per International Journal of Information and Computer Security's guidelines and download the same in Word, PDF and LaTeX formats? Give us a try!.

16. Can I download International Journal of Information and Computer Security in Endnote format?

Yes, SciSpace provides this functionality. After signing up, you would need to import your existing references from Word or Bib file to SciSpace. Then SciSpace would allow you to download your references in International Journal of Information and Computer Security Endnote style according to Elsevier guidelines.

Fast and reliable,
built for complaince.

Instant formatting to 100% publisher guidelines on - SciSpace.

Available only on desktops 🖥

No word template required

Typset automatically formats your research paper to International Journal of Information and Computer Security formatting guidelines and citation style.

Verifed journal formats

One editor, 100K journal formats.
With the largest collection of verified journal formats, what you need is already there.

Trusted by academicians

I spent hours with MS word for reformatting. It was frustrating - plain and simple. With SciSpace, I can draft my manuscripts and once it is finished I can just submit. In case, I have to submit to another journal it is really just a button click instead of an afternoon of reformatting.

Andreas Frutiger
Researcher & Ex MS Word user
Use this template