Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

8

Number of Issues

21

Number of Articles

104

Number of Contributors

213

Article View

81,640

PDF Download

20,308

View Per Article

785

PDF Download Per Article

195.27

-----------------------------------------

Number of Submissions

336

Rejected Submissions

46

Reject Rate

14

Accepted Submissions

98

Acceptance Rate

29

Number of Indexing Databases

8

Number of Reviewers

381

 http://jcomsec.org


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

NOTE: Submissions to this journal are free of charge.

 

 

Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
1. Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)

Hashem Rezaei; Alireza Shafieinejad

Volume 8, Issue 1 , Winter and Spring 2021, Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.123698.1051

Abstract
  Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ...  Read More
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
2. Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Volume 8, Issue 1 , Winter and Spring 2021, Pages 19-32

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
3. Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , Winter and Spring 2021, Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More
Formalizing the main characteristics of QVT-based model transformation languages
1. Formalizing the main characteristics of QVT-based model transformation languages

Alireza Rouhi; Kevin Lano

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 35-62

http://dx.doi.org/10.22108/jcs.2020.121740.1047

Abstract
  Model-Driven Development (MDD) aims at developing software more productively by using models as the main artifacts. Here, the models with high abstraction levels must be transformed ...  Read More
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO
2. A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO

Azam Davahli; mahboubeh shamsi; Golnoush Abaei

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 63-79

http://dx.doi.org/10.22108/jcs.2020.119468.1033

Abstract
  As a result of an incredibly fast growth of the number and diversity of smart devices connectable to the internet, commonly through open wireless sensor networks (WSNs) in internet ...  Read More
A Risk Estimation Framework for Security Threats in Computer Networks
3. A Risk Estimation Framework for Security Threats in Computer Networks

Razieh Rezaee; Abbas Ghaemi Bafghi

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 19-33

http://dx.doi.org/10.22108/jcs.2020.120412.1038

Abstract
  In security risk management of computer networks, some challenges are more serious in large networks. Specifying and estimating risks is largely dependent on the knowledge of security ...  Read More
Generating dynamical S-boxes using 1D Chebyshev chaotic maps
4. Generating dynamical S-boxes using 1D Chebyshev chaotic maps

Ali Shakiba

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 1-17

http://dx.doi.org/10.22108/jcs.2020.116547.1023

Abstract
  This paper considers the construction of chaotic dynamic substitution boxes (S-boxes) using chaotic Chebyshev polynomials of the first kind. The proposed algorithm provides dynamic ...  Read More
Mining Association Rules from Semantic Web Data without User Intervention
5. Mining Association Rules from Semantic Web Data without User Intervention

Reza Ramezani; Mohammad Ali Nematbakhsh; Mohamad Saraee

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 81-94

http://dx.doi.org/10.22108/jcs.2020.121763.1046

Abstract
  With the introduction and standardization of the semantic web as the third generation of the web, this technology has attracted and received more human attention than ever. Thus, the ...  Read More
Bibliometrics Analysis of Research in the Field of Model-Driven Software Engineering
1. Bibliometrics Analysis of Research in the Field of Model-Driven Software Engineering

Hamed Barangi; Shekoufeh Kolahdouz Rahimi; Bahman Zamani; Ali Akbar Khasseh

Articles in Press, Accepted Manuscript, Available Online from 20 July 2021

http://dx.doi.org/10.22108/jcs.2021.125400.1059

Abstract
  Model-Driven Software Engineering (MDSE) is a software development methodology that reduces the cost and production time of the final product by concentrating on the higher level of ...  Read More

Keywords Cloud