Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

9

Number of Issues

24

Number of Articles

124

Number of Contributors

246

Article View

99,423

PDF Download

29,568

View Per Article

801.8

PDF Download Per Article

238.45

-----------------------------------------

Number of Submissions

176

Rejected Submissions

65

Reject Rate

28

Accepted Submissions

115

Acceptance Rate

58

Number of Indexing Databases

9

Number of Reviewers

414

Journal of Computing and Security (JCS) is a peer-reviewed scientific journal which is committed to publication of original results in all areas of modern computing as well as information security.

We are pleased to invite you to submit your original English article(s), which is neither previously published nor under consideration for review or publication elsewhere. This journal is following of committee on publication Ethics (cope) and complies with the highest ethical standards in accordance with ethical laws. The notification of the first decision is sent in at most four months period from the date of submission to expedite the publication process.

The published issues are in English and distributed worldwide in open access fashion.  

All the received manuscripts, before sending for the reviewing process, will be checked by plagiarism software. Journal of Computing and Security (JCS) uses systems and software similar to turnitin, Grammarly, Hamanandjou, iThenticate, SID, Google Scholar, Google, Magiran, to ensure that articles are not duplicated.

This journal has been recieved articles from 2014. 

NOTE: Submissions to this journal are free of charge.

Research Article
Illegal Miner Detection based on Pattern Mining: A Practical Approach
Illegal Miner Detection based on Pattern Mining: A Practical Approach

Maryam Amiri; Hesam Askari

Volume 9, Issue 2 , July 2022, Pages 1-10

https://doi.org/10.22108/jcs.2022.133306.1096

Abstract
  Since the most critical constituent of the cost of cryptocurrency production is energy bills, the use of illegal electricity in cryptocurrency mining farms is very common. Illegal mining ...  Read More
Research Article
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits

Zahra Karimi; S.Fatemeh Noorani

Volume 9, Issue 2 , July 2022, Pages 11-22

https://doi.org/10.22108/jcs.2022.134932.1105

Abstract
  Different programmers code in different ways. Knowing these habits and the human factors that affect them significantly impacts teaching and task assignments in programming. This article ...  Read More
BAS: An Answer Selection Method Using BERT Language Model
BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , July 2021, , Pages 1-18

https://doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices

Fereshteh Abbasi; Marjan Naderan; Seyyed Enayatallah Alavi

Volume 8, Issue 2 , July 2021, , Pages 27-42

https://doi.org/10.22108/jcs.2021.129807.1077

Abstract
  Due to the increasing development and applications of the Internet of Things (IoT), detection and prevention of intruders into the network and devices has gained much attention in the ...  Read More
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model

Solmaz Mohammadi; Gholamreza Farahani

Volume 8, Issue 2 , July 2021, , Pages 43-57

https://doi.org/10.22108/jcs.2021.129691.1073

Abstract
  The scalability of a single gateway LoRa network depends on different parameters such as interference and noise. The scheme of spreading factor allocation can control the interference ...  Read More
Indoor Path Tracking Using Combination of Viterbi and WKNN
Indoor Path Tracking Using Combination of Viterbi and WKNN

Fatemeh Ali Asgari Renani; Hossein Ghaffarian; Mastaneh Chegeni

Volume 8, Issue 2 , July 2021, , Pages 19-26

https://doi.org/10.22108/jcs.2021.129843.1078

Abstract
  In this paper, we focus to find desired node position in indoor environments using a sequence of observations and user movement records. For this purpose, we first record the user's ...  Read More
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags

Alireza Abdellahi Khorasgani; Mahdi Sadjadieh; Mohammad Rohollah Yazdani

Volume 8, Issue 2 , July 2021, , Pages 71-86

https://doi.org/10.22108/jcs.2022.129023.1068

Abstract
  Rapid and ever-increasing Internet of things (IoT) developments have brought about great hopes of improving the quality of human life. Radio-frequency identification (RFID) employed ...  Read More
Research Article
New influence-aware centrality measures for influence maximization in social networks
New influence-aware centrality measures for influence maximization in social networks

Maryam Hosseini

Articles in Press, Accepted Manuscript, Available Online from 18 September 2022

https://doi.org/10.22108/jcs.2022.134191.1100

Abstract
  Influence maximization in social networks is defined as determining a subset of seed nodes where triggering the influence diffusion through the social network leads to maximum number ...  Read More
Research Article
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm

Hossein Ghaffarian; Seyfollah Soleimani; Seyedeh Habibe Zadsar

Articles in Press, Accepted Manuscript, Available Online from 14 November 2022

https://doi.org/10.22108/jcs.2022.133220.1094

Abstract
  In this paper, we present a new method for improving efficiency of indoor localization algorithms, in terms of running time and error rate, using the kd-tree data structure. One of ...  Read More

Keywords Cloud