SERSC: IJSIA
                                                International Journal of Security and Its Applications
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9976

Vol.1, No.1, 2007
Vol.1, No.2, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017

 


Editor-in-Chief of the IJSIA Journal


Bharat Bhargava, Purdue University, USA


General Information of IJSIA

Bibliographic Information

  • ISSN: 1738-9976
  • Publisher: SERSC

    Science & Engineering Research Support soCiety


Contact Information

Science & Engineering Research Support soCiety


Publication and Update

  • Last day of Every Month


Submission Information

 

Guidelines

Journal Paper Publication Policy

  1. The publication will not be an Open Access repository (Effective January 2017).
  2. A maximum of thirty-nine (39) papers will be included in every journal issue (effective April 2013).
  3. Multiple submission of the same paper on different journal submission will all be discarded (effective January 2017).
  4. Paper title, author and corresponding author(s) names should be the same to the submitted paper and on the submission system (effective January 2017).
  5. Each paper should only have one (1) corresponding author and cannot be changed (effective April 2013).
  6. If plagiarism problem was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
    The paper will be removed even though it was already published, and this will be noticed on the home page (effective April 2013).
  7. If double submission was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
    The paper will be removed even though it was published, and this will be noticed on the home page (effective April 2013).
  8. Only paper(s) containing simulation, implementation, case study or other evidence of research advancement will be published.
    Ideal paper can be published after the editorial board grants permission after reviewing the paper (effective April 2013).
  9. Papers from one country cannot exceed 60% in every journal issue; it will be based by the first authors' nationality (effective July 2014).
  10. Only one (1) paper from same author can be included in each issue regardless of role and order (effective July 2014).
  11. SERSC DOES NOT ALLOW ANY AGENTS FROM CHINA to act on our behalf in collecting papers for our journals. SERSC have standard procedures in publication of submitted papers.

Journal Aims

IJSIA aims to facilitate and support research related to security and its applications.

Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security and its applications.

To bridge the gap of users who do not have access to major databases where one should pay for every downloaded article; this online publication platform is open to all readers as part of our commitment to global scientific society.


Journal Topics



The topics covered by IJSIA include the following:-

  • Access Control
  • Ad Hoc & Sensor Network Security
  • Applied Cryptography
  • Authentication and Non-repudiation
  • Cryptographic Protocols
  • Denial of Service
  • E-Commerce Security
  • Identity and Trust Management
  • Information Hiding
  • Insider Threats and Countermeasures
  • Intrusion Detection & Prevention
  • Network & Wireless Security
  • Peer-to-Peer Security
  • Privacy and Anonymity
  • Secure installation, generation and operation
  • Security Analysis Methodologies
  • Security assurance
  • Security in Software Outsourcing
  • Security products or systems
  • Security technology
  • Systems and Data Security
  • Ubiquitous Computing Security

Editorial Board/Reviewers

  • Ahmet Koltuksuz, Izmir Institute of Technology, Turkey
  • Ajith Abraham, Norwegian University of Science and Technology, Norway
  • Alessandro Piva, University of Florence, Italy
  • Audun Josang, School of Software Engineering and Data Communications, Australia
  • Beniamino Di Martino, Second University of Naples, Italy
  • Bingyang Zhou, Austrailian Catholic University, Austraila
  • Brian King, Indiana University Purdue University Indianapolis, USA
  • Chin-Tser Huang, University of South Carolina, USA
  • D. P. Vakharia, S.V.N.I,T, India
  • Damien Sauveron, XLIM Laboratory, France
  • Dharma P. Agrawal, University of Cincinnati, USA
  • Dong Young Lee, Myoungji University, Korea
  • Edgar Weippl, Vienna University of Technology, Austria
  • Enrico Zio, Polytechnic of Milan, Italy
  • Frank Piessens, Katholieke Universiteit Leuven, Belgium
  • George Mohay, Queensland University of Technology, Australia
  • Geyong Min, University of Bradford, UK
  • Gildas Avoine, Massachusetts Institute of Technology, USA
  • Golden G. Richard III, University of New Orleans, USA
  • Hua Liu, Xerox labs, USA
  • Indrajit Ray, Colorado State University, USA
  • Javier Garcia-Villalba, Complutense University of Madrid, Spain
  • Javier Lopez, University of Malaga, Spain
  • Jayaprakash Kar, Al Musanna College of Technology, Sultanate of Oman
  • Jean-Jacques Quisquater, Universite catholique de Louvain, Belgium
  • Jeng-Shyang Pan, National Kaohsiung University of Applied Sciences, Taiwan
  • Jeno Bartalos, ICST, Europe
  • Jianhua Ma, Hosei University, Japan
  • Johnson Thomas, Oklahoma State University, USA
  • Jordi Castell, University of Wisconsin, USA
  • Jordi Forn, Technical University of Catalonia, Spain
  • Jun Bi, Tsinghua University, China
  • Karl Goeschka, Vienna University of Technology, Austria
  • Katrin Franke, Fraunhofer Institute, Germany
  • Kouich Sakurai, Kyushu University, Japan
  • Kyoungseok Kim, Chungbuk National University, Korea
  • Laurence T. Yang, St. Francis Xavier University, Canada
  • Marjan Kuchaki Rafsanjani, University of Kerman, Iran
  • N. Jaisankar, Manonmaniam Sundaranar University, India
  • R. Ravi, Kalasalingam University, India
  • Randy Tolentino, Hannam University, Korea
  • Rosslin John Robles, University of San Agustin, Philippines
  • S. U. Hwang, Hongik University, Korea
  • SeokSoo Kim, Hannam University, Korea
  • Shiguo Lian, France Telecom R&D Beijing, China
  • Suhas J. Manangi, Microsoft India, India
  • Sukumar Senthilkumar, Universiti Sains Malaysia, Malaysia
  • Tao Gong, Donghua University, China
  • Yu-Chen Hu, Providence University, Taiwan
  • Yuh-Min Tseng, National Changhua University of Education, Taiwan

 

IJSIA is indexed by:

  • EBSCO
  • ProQuest
  • ULRICH
  • DOAJ
  • J-Gate
  • Cabell
  • Emerging Sources Citation Index (ESCI)


Editorial Secretary





 
____________________________________________