Researcher.Life Logo

Journal of Computer Security : Impact Factor & More

eISSN: 1875-8924pISSN: 0926-227X

Key Metrics

CiteScore
2
H-Index
58
SJR
Q3Software
SNIP
0.68
Recommended pre-submission checks
Powered by Paperpal by Editage

Topics Covered on Journal of Computer Security

Journal of Computer Security Journal Specifications

Overview
Publisher IOS PRESS
Language English
Frequency Bi-monthly
General Details
LanguageEnglish
FrequencyBi-monthly
Publication Start Year1992
Publisher URLVisit website
Website URLVisit website
View less

Planning to publish in Journal of Computer Security ?

Upload your Manuscript to get

  • Degree of match
  • Common matching concepts
  • Additional journal recommendations
Free Report

Recently Published Papers in Journal of Computer Security

Electromagnetic interference (EMI) backdoor: An EMI-based backdoor attack against computer vision systems
  • 19 Mar 2026
  • Journal of Computer Security
On the challenges of enhancing blockchain privacy
  • 16 Mar 2026
  • Journal of Computer Security
Location-based access control system for mobile devices using bluetooth low energy technology
  • 5 Mar 2026
  • Journal of Computer Security
Model-driven approach enabling formalization and conformance testing of attribute-based access control policies for business processes
  • 26 Feb 2026
  • Journal of Computer Security
SoK: Robust properties, robust abstractions and back-translations
  • 26 Feb 2026
  • Journal of Computer Security
High embedding capacity text steganography using optimal color combinations from 24-bit space
  • 12 Jan 2026
  • Journal of Computer Security
Electromagnetic interference (EMI) backdoor: An EMI-based backdoor attack against computer vision systems
  • 19 Mar 2026
  • Journal of Computer Security
On the challenges of enhancing blockchain privacy
  • 16 Mar 2026
  • Journal of Computer Security
Location-based access control system for mobile devices using bluetooth low energy technology
  • 5 Mar 2026
  • Journal of Computer Security
Model-driven approach enabling formalization and conformance testing of attribute-based access control policies for business processes
  • 26 Feb 2026
  • Journal of Computer Security
SoK: Robust properties, robust abstractions and back-translations
  • 26 Feb 2026
  • Journal of Computer Security
High embedding capacity text steganography using optimal color combinations from 24-bit space
  • 12 Jan 2026
  • Journal of Computer Security

FAQs on Journal of Computer Security