Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

8

Number of Issues

22

Number of Articles

108

Number of Contributors

220

Article View

87,896

PDF Download

22,190

View Per Article

813.85

PDF Download Per Article

205.46

-----------------------------------------

Number of Submissions

346

Rejected Submissions

51

Reject Rate

15

Accepted Submissions

101

Acceptance Rate

29

Number of Indexing Databases

7

Number of Reviewers

394

 http://jcomsec.org


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

NOTE: Submissions to this journal are free of charge.

 

 

BAS: An Answer Selection Method Using BERT Language Model
1. BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , Summer and Autumn 2021, Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
BAS: An Answer Selection Method Using BERT Language Model
1. BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , Summer and Autumn 2021, , Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
A Context Model for Business Process Adaptation based on Ontology Reasoning
2. A Context Model for Business Process Adaptation based on Ontology Reasoning

Leila Kord Toudeshki; Mir Ali Seyyedi; Afshin Salajegheh

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 119-140

http://dx.doi.org/10.22108/jcs.2021.124660.1056

Abstract
  The surrounding context information of business processes is unpredictable and dynamically changing over time. Therefore, they should dynamically adapt themselves to different changes ...  Read More
Signature Codes for Energy-Efficient Data Movement in On-chip Networks
3. Signature Codes for Energy-Efficient Data Movement in On-chip Networks

Masoud Dehyadegari

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 95-101

http://dx.doi.org/10.22108/jcs.2020.120813.1041

Abstract
  On-chip networks provide a scalable infrastructure for moving data among cores in many-core systems. In future technologies, significant amounts of dynamic energy are dissipated for ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
4. Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , Winter and Spring 2021, , Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
5. Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Hossein Arabnezhad; Babak Sadeghian

Volume 7, Issue 2 , Summer and Autumn 2020, , Pages 103-117

http://dx.doi.org/10.22108/jcs.2020.123673.1050

Abstract
  In this paper, we propose a new method to launch a more efficient algebraic cryptanalysis. Algebraic cryptanalysis aims at finding the secret key of a cipher by solving a collection ...  Read More
Indoor Path Tracking Using Combination of Viterbi and WKNN
1. Indoor Path Tracking Using Combination of Viterbi and WKNN

fatemeh aliasgarirenani; Hossein Ghaffarian; mastaneh chegeni

Articles in Press, Accepted Manuscript, Available Online from 08 November 2021

http://dx.doi.org/10.22108/jcs.2021.129843.1078

Abstract
  In this paper, we focus to find desired node position in indoor environments using a sequence of observations and user movement records. For this purpose, we first record the user's ...  Read More

Keywords Cloud