Journal Navigation
International Journal of Information Security and Privacy (IJISP)
Open Access Journal
Clarivate Impact Factor 0.8

International Journal of Information Security and Privacy (IJISP)

This journal converted to Gold Open Access on January 1, 2023
Editors-in-Chief: Yassine Maleh (Sultan Moulay Slimane University, Morocco), Ahmed A. Abd El-Latif (Menoufia University, Egypt)
Indexed In: Compendex (Elsevier Engineering Index), INSPEC, SCOPUS, Web of Science Emerging Sources Citation Index (ESCI) and 18 more indices
Published: Continuous Volume |Established: 2007
ISSN: 1930-1650|EISSN: 1930-1669|DOI: 10.4018/IJISP
Latest Published Articles
Published: May 7, 2024
DOI: 10.4018/IJISP.343306
Volume 18
Yuan Tian, Wendong Wang, Jingyuan He
The existing Industrial Internet of Things (IIoT) temporal data analysis methods often suffer from issues such as information loss, difficulty balancing spatial and temporal features, and being... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Tian, Yuan, et al. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training." vol.18, no.1 2024: pp.1-28. http://doi.org/10.4018/IJISP.343306

APA

Tian, Y., Wang, W., & He, J. (2024). An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training. , 18(1), 1-28. http://doi.org/10.4018/IJISP.343306

Chicago

Tian, Yuan, Wendong Wang, and Jingyuan He. "An IIoT Temporal Data Anomaly Detection Method Combining Transformer and Adversarial Training," 18, no.1: 1-28. http://doi.org/10.4018/IJISP.343306

Export Reference

Mendeley
Published: May 2, 2024
DOI: 10.4018/IJISP.342596
Volume 18
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu, Han-Bing Yan
Vulnerability can lead to data loss, privacy leakage and financial loss. Accurate detection and identification of vulnerabilities is essential to prevent information leakage and APT attacks. This... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs." vol.18, no.1 2024: pp.1-21. http://doi.org/10.4018/IJISP.342596

APA

Liu, Y., Zhao, X., Qiu, X., & Yan, H. (2024). VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs. , 18(1), 1-21. http://doi.org/10.4018/IJISP.342596

Chicago

Liu, Yashu, et al. "VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs," 18, no.1: 1-21. http://doi.org/10.4018/IJISP.342596

Export Reference

Mendeley
Published: Mar 20, 2024
DOI: 10.4018/IJISP.340728
Volume 18
Musa Ugbedeojo, Marion O. Adebiyi, Oluwasegun Julius Aroba, Ayodele Ariyo Adebiyi
Almost every living species has a motive to communicate electronically with one another and preserve data for immediate or future use. These data are becoming too large to be maintained on personal... Show More
Download (PDF): Article
Add to Your Personal Library: Article
Cite Article

MLA

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review." vol.18, no.1 2024: pp.1-27. http://doi.org/10.4018/IJISP.340728

APA

Ugbedeojo, M., Adebiyi, M. O., Aroba, O. J., & Adebiyi, A. A. (2024). RSA and Elliptic Curve Encryption System: A Systematic Literature Review. , 18(1), 1-27. http://doi.org/10.4018/IJISP.340728

Chicago

Ugbedeojo, Musa, et al. "RSA and Elliptic Curve Encryption System: A Systematic Literature Review," 18, no.1: 1-27. http://doi.org/10.4018/IJISP.340728

Export Reference

Mendeley
Description, Mission, Scope & Coverage
Description:
As information technology and the Internet become more and more ubiquitous and pervasive in our daily lives, there is an essential need for a more thorough understanding of information security and privacy issues and concerns. The International Journal of Information Security and Privacy (IJISP)... Show More
Mission & Scope:
The overall mission of the International Journal of Information Security and Privacy (IJISP) is to create and foster a forum where research in the theory and practice of information security and privacy is advanced. The journal strives to serve a diverse readership by publishing articles in a range of topics in information security and privacy that would appeal to a broad cross-sectional and... Show More
Coverage:
  • Agents and mobile communication systems
  • Authentication and authorization of users, systems, and applications
  • Businesses models and systems with security and privacy requirements and management
  • Case studies in security and privacy
  • Civil rights and liberties
  • Computer worms and viruses
  • Consumer and business practices and trends
  • Cryptographic techniques and protocols
  • Database issues in privacy protection
  • Developing enterprise management of security and privacy policies and infrastructures
  • Development of formal models and definitions
  • Distributed marketplaces, auctions, and gaming
  • Distributed, forward, and proactive policies and procedures
  • Economic impact analysis
  • Electronic commerce, banking, and payment protocols
  • Encryption, authentication, and access control
  • Enhancements for storage area networks
  • E-services, e-voting, and e-government
  • File and file system security and privacy
  • Firewall technologies, policies, and trends
  • Global Issues
  • Hacking and corruptions
  • Hacking, cyber-terrorism, and intrusion detection
  • Heterogeneous and large-scale environments
  • Identity and privacy confidentiality
  • Legal, regulatory, and compliance issues
  • Malicious codes and attacks against networks
  • Multiparty communications, co-operations, and computations
  • Networks and security protocols
  • Peer-to-Peer computing
  • Preserving and enhancing technologies and initiatives
  • Relationships and trade-offs between security and privacy
  • Security and privacy techniques, management, and protocols
  • Tools, techniques, methods, and frameworks
  • Trends and new developments
  • Trust architectures and underlying infrastructures
  • World Wide Web authentication and authorization
Editorial Policy
IGI Global holds its journals to the highest ethical practices. View Full Editorial Policy
IGI Global Open Access
When you publish under the OA model with IGI Global, you enable your work to be viewed by millions of readers worldwide immediately after publication and you are able to experience our personal support and commitment to editorial service. This includes:
  • Timely Publication: Quick Turnarounds & Prompt Peer Review (No Embargoes)
  • Continuous Support: In-House, Personalized Service Throughout the Entire Process
  • Cutting-Edge Technology: Proprietary Technologies & Integrations With Major Open Access Platforms
  • Diverse Options: Individual APCs, Platinum Funding, Institutional Open Access Agreements, & More
  • Research Advancement First: IGI Global Prioritizes Research Over Profit by Forfeiting Subscription Revenue
  • Unmatched Transparency: Comprehensive Visibility in Processes, Licensing, & More
  • Rapid Transformation: IGI Global is One of Few Publishers That Have Completed the Open Access Transition
  • Independence and Integrity: IGI Global is Committed to Maintaining its Autonomy as an Independent Publisher
  • Medium-Sized, Yet Powerful: IGI Global Offers Advantages of a Medium-Sized Publisher With the Reach of a Larger Publisher
Article Processing Charges
Article Processing Charge (APC):

Payment of the APC fee (directly to the publisher) by the author or a funding body is not required until AFTER the manuscript has gone through the full double-anonymized peer review process and the Editor(s)-in-Chief at his/her/their full discretion has/have decided to accept the manuscript based on the results of the double-anonymized peer review process. 

What Does IGI Global's Open Access APC Cover?

In the traditional subscription-based model, the cost to the publisher to produce each article is covered by the revenue generated by journal subscriptions. Under OA, all the articles are published under a Creative Commons (CC BY) license; therefore, the authors or funding body will pay a one-time article processing charge (APC) to offset the costs of all of the activities associated with the publication of the article manuscript, including:

  • Digital tools used to support the manuscript management and review process
  • Typesetting, formatting and layout
  • Online hosting
  • Submission of the journal's content to numerous abstracts, directories, and indexes
  • Third-party software (e.g. plagiarism checks)
  • Editorial support which includes manuscript tracking, communications, submission guideline checks, and communications with authors and reviewers
  • All promotional support and activities which include metadata distribution, press releases, promotional communications, web content, ads, fliers, brochures, postcards, etc. for the journal and its published contents
  • The fact that all published articles will be freely accessible and able to be posted and disseminated widely by
    the authors
  • Professional line-by-line English language copy editing and proofreading*

*This service is only performed on article manuscripts with fully paid (not discounted or waived) APC fees.

APC Subsidizing and Funding

To assist researchers in covering the costs of the APC in OA publishing, there are various sources of OA funding. Additionally, unlike many other publishers, IGI Global offers flexible subsidies, 100% Open Access APC funding, discounts, and more. Learn More

Open Access Funding Resources
IGI Global recognizes that many researchers may not know where to begin when searching for OA funding opportunities. IGI Global recently launched an Open Access Funding Resources page for researchers to browse. This page provides a comprehensive list of OA funding sources available for researchers to secure funds for their various OA publications.
Submit to This Journal
This journal is currently actively seeking new submissions. Interested authors should ensure that their article manuscript adheres to the journal's submission guidelines and before you write page, which include originality of the manuscript, APA formatting information and examples, manuscript requirements, and more. To submit an article for consideration, please begin the submission process below.
Reviews & Statements

The exponential growth of information storage has lead to a large scale of infringement of data in enterprise. The International Journal of Information Security and Privacy (IJISP) is a forum in which researchers have contributed their ideas and concepts relatedt o information security and privacy. This journal serves the important purpose of bringing together researchers and practitioners in the area of information security and privacy. The well reviewed articles are a useful resource to researchers. The journal is a definite asset to academic library.

– Latha Parameswaran, Amrita Unviersity, India

In today's world, as one starts giving more and more importance to security issues, there is every possibility that an individual's rights to privacy will be affected. The International Journal of Information Security and Privacy attempts to address both requirements by publishing articles with a quick turnaround time while maintaining the highest quality expected from it's renowned editorial board.

– Shamik Sural, IIT Kharagpur, India
Contact
Submission-Related Inquiries
All inquiries regarding IJISP should be directed to the attention of:

Dr. Yassine Maleh
Dr. Ahmed A. Abd El-Latif
Editors-in-Chief
International Journal of Information Security and Privacy (IJISP)
Email: yassine.maleh@ieee.org & ahmedabdellatif@ieee.org

Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.com

Open Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.com

Production-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.com

Rights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.com

Publication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.com

Discoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com

Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Ownership and Management

The International Journal of Information Security and Privacy (IJISP) is owned and published by IGI Global.

International Journal of Information Security and Privacy (IJISP) is editorially independent, with full authority of the journal's content falling to the Editor-in-Chief and the journal's Editorial Board.

The In-House Editorial Office manages the publishing operations of the journal.

IGI Global
701 East Chocolate Avenue
Hershey, PA 17033
USA

Principal Contact
Grace Long
Managing Editor of Journal Development
IGI Global
Phone: (717) 533-8845 ext. 147
E-mail: glong@igi-global.com

Support Contact
Marissa Massare
Development Editor - International Journal of Information Security and Privacy (IJISP)
IGI Global
Phone: 717-533-8845
E-mail: mmassare@igi-global.com