Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

9

Number of Issues

23

Number of Articles

116

Number of Contributors

234

Article View

94,567

PDF Download

26,916

View Per Article

815.23

PDF Download Per Article

232.03

-----------------------------------------

Number of Submissions

176

Rejected Submissions

56

Reject Rate

28

Accepted Submissions

110

Acceptance Rate

58

Number of Indexing Databases

9

Number of Reviewers

403

 

Journal of Computing and Security (JCS) is a peer-reviewed scientific journal which is committed to publication of original results in all areas of modern computing as well as information security.

We are pleased to invite you to submit your original English article(s), which is neither previously published nor under consideration for review or publication elsewhere. This journal is following of committee on publication Ethics (cope) and complies with the highest ethical standards in accordance with ethical laws. The notification of the first decision is sent in at most four months period from the date of submission to expedite the publication process.

The published issues are in English and distributed worldwide in open access fashion.  All the received manuscripts, before sending for the reviewing process, will be checked by plagiarism software. Journal of Computing and Security (JCS) uses systems and software similar to turnitin, Grammarly, Hamanandjou, iThenticate, SID, Google Scholar, Google, Magiran, to ensure that articles are not duplicated.

NOTE: Submissions to this journal are free of charge.

Research Article
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts

Dina Khodayari Tehraninejad; Sedigheh Khoshnevis

Volume 9, Issue 1 , January 2022, Pages 1-29

http://dx.doi.org/10.22108/jcs.2021.130065.1080

Abstract
  In highly configurable information systems such as SaaS information systems, business process variability management is an important issue. The variability model, which is often called ...  Read More
Research Article
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure

Mohammad Reza Nilforoush; Zeinab Zali; Massoud Reza Hashemi

Volume 9, Issue 1 , January 2022, Pages 31-44

http://dx.doi.org/10.22108/jcs.2022.131452.1086

Abstract
  The Internet of Things is a paradigm for connecting objects using a common set of network technologies. Implementing IoT by host-to-host communication models, such as IP, faces several ...  Read More
Research Article
Gaussian Linear Regression Crossover for Genetic Algorithms
Gaussian Linear Regression Crossover for Genetic Algorithms

Pezhman Gholamnezhad

Volume 9, Issue 1 , January 2022, Pages 45-56

http://dx.doi.org/10.22108/jcs.2022.131269.1084

Abstract
  In the simulated binary crossover, offspring are generated from parents with a coefficient of variation and uses a probability distribution function for the coefficient and there is ...  Read More
BAS: An Answer Selection Method Using BERT Language Model
BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , July 2021, , Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices

Fereshteh Abbasi; Marjan Naderan; Seyyed Enayatallah Alavi

Volume 8, Issue 2 , July 2021, , Pages 27-42

http://dx.doi.org/10.22108/jcs.2021.129807.1077

Abstract
  Due to the increasing development and applications of the Internet of Things (IoT), detection and prevention of intruders into the network and devices has gained much attention in the ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , January 2021, , Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Volume 8, Issue 1 , January 2021, , Pages 19-32

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ...  Read More
Model-Driven Software Engineering: A Bibliometric Analysis
Model-Driven Software Engineering: A Bibliometric Analysis

Hamed Barangi; Shekoufeh Kolahdouz Rahimi; Bahman Zamani; Ali Akbar Khasseh

Volume 8, Issue 1 , January 2021, , Pages 93-108

http://dx.doi.org/10.22108/jcs.2021.125400.1059

Abstract
  Model-Driven Software Engineering (MDSE) is a software development methodology that reduces the cost and production time of the final product by concentratingon a higher level of abstraction. ...  Read More

Keywords Cloud