Aim and scope

Journal of Information Security and its Applications is an international journal of high repute covering topics of interest to all those researching and working in the field of information security on the basis of its originality, importance, interdisciplinary interest, accessibility, timeliness, elegance, and novelty.

Journal of Information Security and its Applications (JISA) aim is to provide a platform to serve researchers through prompt publication of significant advances in the field of security studies and to provide a forum for the reporting and discussion of latest updates, progress, and application of scientific discoveries in information security and its applications. JISA will keep up to date with the latest advances and innovations in this field by providing free access to the research information.

JISA Publishes articles exploring concepts, strategies, approaches, and issues of relevance to the security system which make a significant and original contribution to theory and practice. These articles present innovative ideas, best practices, and leading-edge thinking about all aspects of publishing, authorship, and readership. Journal ensures that the results of science experiments are rapidly disseminated to the scientific community and public immediately after publication, thus providing higher citation rates for the author.

The Journal of Information Security and its Applications (JISA) is committed to publishing scholarly empirical and theoretical research articles, that have a high impact on the security system study. The journal encourages new ideas or new perspectives on existing research.

It welcomes and acknowledges high-quality theoretical and empirical original research articles, case reports, review articles, short communications, literature reviews, editorials, conceptual frameworks, short reviews from academicians, scientists, professionals, practitioners, and scholars from all over the world.

JISA has a broad scope and welcome submissions from across a range of disciplines, and all aspect of Information Security and its applications that will make an advance improvement in this field. Articles written from a theoretical or applied perspective are welcome.

The journal covers subject areas but not limited to:
  • Multimedia security primitives
  • Fingerprinting and traitor tracing
  • Steganography and Steganalysis
  • Joint signal processing and encryption
  • Signal processing in the encrypted domain
  • Applied Cryptography
  • Biometrics
  • Digital Forensics
  • Multimedia signal processing approaches tailored towards adversarial environments
  • Machine learning in adversarial environments
  • Digital Rights Management
  • Network security
  • Hardware security
  • Physical Unclonable Functions
  • Privacy-Enhancing Technologies for Multimedia Data
  • Private Data Analysis
  • Security in Outsourced Computations
  • Cloud Privacy

Contact Us

Scientific Eminence Group

Scientific Eminence Group journals follows and maintain highest standards of quality, with strong Editorial Boards composed of renowned professors and scientists from around the world. It is an International repository for accepted and published research work of various countries researchers.

1649, Whispering wind, Dr Tracy, CA 95377

jisa@scientificeminencegroup.com

+1(969)274-0389