Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

7

Number of Issues

20

Number of Articles

100

Number of Contributors

206

Article View

78,144

PDF Download

18,982

View Per Article

781.44

PDF Download Per Article

189.82

-----------------------------------------

Number of Submissions

328

Rejected Submissions

44

Reject Rate

13

Accepted Submissions

94

Acceptance Rate

29

Time to Accept (Days)

392

Number of Indexing Databases

8

Number of Reviewers

374

 http://jcomsec.org


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

NOTE: Submissions to this journal are free of charge.

 

 

Signature Codes for Energy-Efficient Data Movement in On-chip Networks
2. Signature Codes for Energy-Efficient Data Movement in On-chip Networks

Masoud Dehyadegari

Volume 7, Issue 2 , Summer and Autumn 2020, Pages 95-101

http://dx.doi.org/10.22108/jcs.2020.120813.1041

Abstract
  On-chip networks provide a scalable infrastructure for moving data among cores in many-core systems. In future technologies, significant amounts of dynamic energy are dissipated for ...  Read More
Toward A More Efficient Gröbner-based Algebraic Cryptanalysis
3. Toward A More Efficient Gröbner-based Algebraic Cryptanalysis

Hossein Arabnezhad; Babak Sadeghian

Volume 7, Issue 2 , Summer and Autumn 2020, Pages 103-117

http://dx.doi.org/10.22108/jcs.2020.123673.1050

Abstract
  In this paper, we propose a new method to launch a more efficient algebraic cryptanalysis. Algebraic cryptanalysis aims at finding the secret key of a cipher by solving a collection ...  Read More
A Context Model for Business Process Adaptation based on Ontology Reasoning
4. A Context Model for Business Process Adaptation based on Ontology Reasoning

Leila Kord Toudeshki; Mir Ali Seyyedi; Afshin Salajegheh

Volume 7, Issue 2 , Summer and Autumn 2020, Pages 119-140

http://dx.doi.org/10.22108/jcs.2021.124660.1056

Abstract
  The surrounding context information of business processes is unpredictable and dynamically changing over time. Therefore, they should dynamically adapt themselves to different changes ...  Read More
Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem
5. Applying Meta-Heuristics Algorithms in Model-Driven Approaches for Solving the CRA Problem

Sogol Faridmoayer; Samaneh HoseinDoost; Shekoufeh Kolahdouz Rahimi; Bahman Zamani

Volume 7, Issue 2 , Summer and Autumn 2020, Pages 141-161

http://dx.doi.org/10.22108/jcs.2021.125010.1057

Abstract
  The Class Responsibility Assignment (CRA) problem is one of the most important problems in Object-Oriented Software Engineering. It is a Search-based optimization problem to assign ...  Read More
Formalizing the main characteristics of QVT-based model transformation languages
1. Formalizing the main characteristics of QVT-based model transformation languages

Alireza Rouhi; Kevin Lano

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 35-62

http://dx.doi.org/10.22108/jcs.2020.121740.1047

Abstract
  Model-Driven Development (MDD) aims at developing software more productively by using models as the main artifacts. Here, the models with high abstraction levels must be transformed ...  Read More
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO
2. A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO

Azam Davahli; mahboubeh shamsi; Golnoush Abaei

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 63-79

http://dx.doi.org/10.22108/jcs.2020.119468.1033

Abstract
  As a result of an incredibly fast growth of the number and diversity of smart devices connectable to the internet, commonly through open wireless sensor networks (WSNs) in internet ...  Read More
eXtreme Modeling: an approach to agile model-based development
3. eXtreme Modeling: an approach to agile model-based development

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton

Volume 6, Issue 2 , Summer and Autumn 2019, , Pages 43-52

http://dx.doi.org/10.22108/jcs.2019.115445.1018

Abstract
  Model-based development (MBD) is the development of software systems using graphical and textual models such as UML class diagrams. MBD and related approaches such as Model-driven development ...  Read More
A Risk Estimation Framework for Security Threats in Computer Networks
4. A Risk Estimation Framework for Security Threats in Computer Networks

Razieh Rezaee; Abbas Ghaemi Bafghi

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 19-33

http://dx.doi.org/10.22108/jcs.2020.120412.1038

Abstract
  In security risk management of computer networks, some challenges are more serious in large networks. Specifying and estimating risks is largely dependent on the knowledge of security ...  Read More
Generating dynamical S-boxes using 1D Chebyshev chaotic maps
5. Generating dynamical S-boxes using 1D Chebyshev chaotic maps

Ali Shakiba

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 1-17

http://dx.doi.org/10.22108/jcs.2020.116547.1023

Abstract
  This paper considers the construction of chaotic dynamic substitution boxes (S-boxes) using chaotic Chebyshev polynomials of the first kind. The proposed algorithm provides dynamic ...  Read More

Keywords Cloud