Key Metrics
CiteScore 

2
H-Index 

58
SJR 

Q3Software

SNIP 

0.68
Recommended pre-submission checks
Powered by 

Topics Covered on Journal of Computer Security
Journal of Computer Security Journal Specifications
| Overview | |
| Publisher | IOS PRESS |
| Language | English |
| Frequency | Bi-monthly |
| General Details | |
| Language | English |
| Frequency | Bi-monthly |
| Publication Start Year | 1992 |
| Publisher URL | Visit website |
| Website URL | Visit website |
View less
Planning to publish in Journal of Computer Security ?
Upload your Manuscript to get
- Degree of match
- Common matching concepts
- Additional journal recommendations

Recently Published Papers in Journal of Computer Security
Electromagnetic interference (EMI) backdoor: An EMI-based backdoor attack against computer vision systems
- 19 Mar 2026
- Journal of Computer Security
On the challenges of enhancing blockchain privacy
- 16 Mar 2026
- Journal of Computer Security
Location-based access control system for mobile devices using bluetooth low energy technology
- 5 Mar 2026
- Journal of Computer Security
Model-driven approach enabling formalization and conformance testing of attribute-based access control policies for business processes
- 26 Feb 2026
- Journal of Computer Security
SoK: Robust properties, robust abstractions and back-translations
- 26 Feb 2026
- Journal of Computer Security
High embedding capacity text steganography using optimal color combinations from 24-bit space
- 12 Jan 2026
- Journal of Computer Security
Electromagnetic interference (EMI) backdoor: An EMI-based backdoor attack against computer vision systems
- 19 Mar 2026
- Journal of Computer Security
On the challenges of enhancing blockchain privacy
- 16 Mar 2026
- Journal of Computer Security
Location-based access control system for mobile devices using bluetooth low energy technology
- 5 Mar 2026
- Journal of Computer Security
Model-driven approach enabling formalization and conformance testing of attribute-based access control policies for business processes
- 26 Feb 2026
- Journal of Computer Security
SoK: Robust properties, robust abstractions and back-translations
- 26 Feb 2026
- Journal of Computer Security
High embedding capacity text steganography using optimal color combinations from 24-bit space
- 12 Jan 2026
- Journal of Computer Security