当前位置: X-MOL首页最新SCI期刊查询及投稿分析系统 › IET Information Security杂志
IET Information Security
基本信息
期刊名称 IET Information Security
IET INFORM SECUR
期刊ISSN 1751-8709
期刊官方网站 https://www.hindawi.com/journals/ietis
是否OA Yes
出版商 John Wiley & Sons Inc.
出版周期 Bi-monthly
文章处理费 登录后查看
始发年份 2007
年文章数 33
最新影响因子 1.3(2023)  scijournal影响因子  greensci影响因子
中科院SCI期刊分区
大类学科 小类学科 Top 综述
工程技术4区 COMPUTER SCIENCE, INFORMATION SYSTEMS 计算机:信息系统4区
COMPUTER SCIENCE, THEORY & METHODS 计算机:理论方法4区
CiteScore
CiteScore排名 CiteScore SJR SNIP
学科 排名 百分位 3.8 0.480 0.654
Computer Science
Computer Networks and Communications
193/395 51%
Computer Science
Information Systems
193/394 51%
Computer Science
Software
222/407 45%
补充信息
自引率 7.7%
H-index 26
SCI收录状况 Science Citation Index Expanded
官方审稿时间 登录后查看
网友分享审稿时间 数据统计中,敬请期待。
接受率 登录后查看
PubMed Central (PMC) http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1751-8709%5BISSN%5D
投稿指南
期刊投稿网址 https://mc.manuscriptcentral.com/theiet-ifs
收稿范围
IET Information Security publishes original research and review articles in the following areas of information security and cryptography. Submitting authors should specify clearly in their cover letter the area into which their paper falls.

Access Control and Database Security
	Ad-Hoc Network Aspects
	Anonymity and E-Voting
	Authentication
	Block Ciphers and Hash Functions
	Blockchain, Bitcoin (technical aspects only)
	Broadcast Encryption and Traitor Tracing
	Combinatorial Aspects
	Covert Channels and Information Flow
	Critical Infrastructures
	Cryptanalysis
	Dependability
	Digital Banking
	Digital Currencies
	Digital Rights Management
	Digital Signature Schemes
	Digital Steganography
	DNS Security
	Economic Aspects of Information Security
	Elliptic Curve Cryptography and Number Theory
	Embedded Systems Aspects
	Embedded Systems Security and Forensics
	Financial Cryptography
	Firewall Security
	Formal Methods and Security Verification
	Hardware Security
	Human Aspects
	Information Warfare and Survivability
	Intrusion Detection
	Java and XML Security
	Key Distribution
	Key Management
	Malware
	Multi-Party Computation and Threshold Cryptography
	Network Security
	Peer-to-peer Security
	PKIs
	Public-Key and Hybrid Encryption
	Quantum Cryptography
	Risks of using Computers
	Robust Networks
	Secret Sharing
	Secure Electronic Commerce
	Software Obfuscation
	Stream Ciphers
	Trust Models
	Watermarking and Fingerprinting
收录体裁
投稿指南
投稿模板
参考文献格式
编辑信息

                                
我要分享  (欢迎您来完善期刊的资料,分享您的实际投稿经验)
研究领域:
投稿录用情况: 审稿时间:  个月返回审稿结果
本次投稿点评:
提交
down
wechat
bug