Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

9

Number of Issues

24

Number of Articles

126

Number of Contributors

247

Article View

100,880

PDF Download

30,870

View Per Article

800.63

PDF Download Per Article

245

-----------------------------------------

Number of Submissions

176

Rejected Submissions

66

Reject Rate

28

Accepted Submissions

117

Acceptance Rate

58

Number of Indexing Databases

9

Number of Reviewers

416

Journal of Computing and Security (JCS) is a peer-reviewed scientific journal which is committed to publication of original results in all areas of modern computing as well as information security.

We are pleased to invite you to submit your original English article(s), which is neither previously published nor under consideration for review or publication elsewhere. This journal is following of committee on publication Ethics (cope) and complies with the highest ethical standards in accordance with ethical laws. The notification of the first decision is sent in at most four months period from the date of submission to expedite the publication process.

The published issues are in English and distributed worldwide in open access fashion.  

All the received manuscripts, before sending for the reviewing process, will be checked by plagiarism software. Journal of Computing and Security (JCS) uses systems and software similar to turnitin, Grammarly, Hamanandjou, iThenticate, SID, Google Scholar, Google, Magiran, to ensure that articles are not duplicated.

This journal has been recieved articles from 2014. 

NOTE: Submissions to this journal are free of charge.

Research Article
Illegal Miner Detection based on Pattern Mining: A Practical Approach
Illegal Miner Detection based on Pattern Mining: A Practical Approach

Maryam Amiri; Hesam Askari

Volume 9, Issue 2 , July 2022, Pages 1-10

https://doi.org/10.22108/jcs.2022.133306.1096

Abstract
  Since the most critical constituent of the cost of cryptocurrency production is energy bills, the use of illegal electricity in cryptocurrency mining farms is very common. Illegal mining ...  Read More
Research Article
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits

Zahra Karimi; S.Fatemeh Noorani

Volume 9, Issue 2 , July 2022, Pages 11-22

https://doi.org/10.22108/jcs.2022.134932.1105

Abstract
  Different programmers code in different ways. Knowing these habits and the human factors that affect them significantly impacts teaching and task assignments in programming. This article ...  Read More
Research Article
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks

Maryam Hosseini-Pozveh

Volume 9, Issue 2 , July 2022, Pages 23-38

https://doi.org/10.22108/jcs.2022.134191.1100

Abstract
  Influence maximization in social networks is defined as determining a subset of seed nodes where triggering the influence diffusion through the social network leads to the maximum number ...  Read More
Research Article
Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities
Decentralized App Store and License Management Using Smart Contracts and Self-Sovereign Identities

Sadegh Dorri Nogoorani

Volume 9, Issue 2 , July 2022, Pages 39-54

https://doi.org/10.22108/jcs.2022.134436.1103

Abstract
  Mobile applications are playing an important role in our digital lives. App stores can be considered key components in the ecosystem of mobile applications. They assist users to ensure ...  Read More
Research Article
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm
Indoor Localization Performance Optimization Using Modified kd-Tree Algorithm

Hossein Ghaffarian; Seyfollah Soleimani; Seyedeh Habibe Zadsar

Volume 9, Issue 2 , July 2022, Pages 55-64

https://doi.org/10.22108/jcs.2022.133220.1094

Abstract
  In this paper, we present a new method for improving the efficiency of indoor localization algorithms, in terms of running time and error rate, using the KD-tree data structure. One ...  Read More
BAS: An Answer Selection Method Using BERT Language Model
BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , July 2021, , Pages 1-18

https://doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices

Fereshteh Abbasi; Marjan Naderan; Seyyed Enayatallah Alavi

Volume 8, Issue 2 , July 2021, , Pages 27-42

https://doi.org/10.22108/jcs.2021.129807.1077

Abstract
  Due to the increasing development and applications of the Internet of Things (IoT), detection and prevention of intruders into the network and devices has gained much attention in the ...  Read More
Indoor Path Tracking Using Combination of Viterbi and WKNN
Indoor Path Tracking Using Combination of Viterbi and WKNN

Fatemeh Ali Asgari Renani; Hossein Ghaffarian; Mastaneh Chegeni

Volume 8, Issue 2 , July 2021, , Pages 19-26

https://doi.org/10.22108/jcs.2021.129843.1078

Abstract
  In this paper, we focus to find desired node position in indoor environments using a sequence of observations and user movement records. For this purpose, we first record the user's ...  Read More
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model
Scalability Analysis of a LoRa Network Under Inter-SF and Co-SF Interference with Poisson Point Process Model

Solmaz Mohammadi; Gholamreza Farahani

Volume 8, Issue 2 , July 2021, , Pages 43-57

https://doi.org/10.22108/jcs.2021.129691.1073

Abstract
  The scalability of a single gateway LoRa network depends on different parameters such as interference and noise. The scheme of spreading factor allocation can control the interference ...  Read More
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags
A Lightweight Authentication Scheme for RFID with Permutation Operation on Passive Tags

Alireza Abdellahi Khorasgani; Mahdi Sadjadieh; Mohammad Rohollah Yazdani

Volume 8, Issue 2 , July 2021, , Pages 71-86

https://doi.org/10.22108/jcs.2022.129023.1068

Abstract
  Rapid and ever-increasing Internet of things (IoT) developments have brought about great hopes of improving the quality of human life. Radio-frequency identification (RFID) employed ...  Read More
Research Article
Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes
Design of Optimal Progressive BKZ with Increasing Success-Probabilities and Increasing Block-Sizes

Gholam Reza Moghissi; Ali Payandeh

Articles in Press, Accepted Manuscript, Available Online from 12 December 2022

https://doi.org/10.22108/jcs.2022.130820.1083

Abstract
  Former studies on progressive-BKZ almost focus on increasing block sizes. Our work in IJCNIS 9.9, 2018, introduces a new version of progressive-BKZ based on increasing success probabilities, ...  Read More

Keywords Cloud