Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

9

Number of Issues

23

Number of Articles

122

Number of Contributors

242

Article View

96,353

PDF Download

28,672

View Per Article

789.78

PDF Download Per Article

235.02

-----------------------------------------

Number of Submissions

176

Rejected Submissions

63

Reject Rate

28

Accepted Submissions

113

Acceptance Rate

58

Number of Indexing Databases

9

Number of Reviewers

411

Journal of Computing and Security (JCS) is a peer-reviewed scientific journal which is committed to publication of original results in all areas of modern computing as well as information security.

We are pleased to invite you to submit your original English article(s), which is neither previously published nor under consideration for review or publication elsewhere. This journal is following of committee on publication Ethics (cope) and complies with the highest ethical standards in accordance with ethical laws. The notification of the first decision is sent in at most four months period from the date of submission to expedite the publication process.

The published issues are in English and distributed worldwide in open access fashion.  

All the received manuscripts, before sending for the reviewing process, will be checked by plagiarism software. Journal of Computing and Security (JCS) uses systems and software similar to turnitin, Grammarly, Hamanandjou, iThenticate, SID, Google Scholar, Google, Magiran, to ensure that articles are not duplicated.

This journal has been recieved articles from 2014. 

NOTE: Submissions to this journal are free of charge.

Research Article
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts
Proxima: Process Mining for Extracting Configurable Process Models Using Software Product Line Concepts

Dina Khodayari Tehraninejad; Sedigheh Khoshnevis

Volume 9, Issue 1 , January 2022, Pages 1-29

http://dx.doi.org/10.22108/jcs.2021.130065.1080

Abstract
  In highly configurable information systems such as SaaS information systems, business process variability management is an important issue. The variability model, which is often called ...  Read More
Research Article
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure
Deploying IoT, Based on NDN Protocol in a Fog Computing Infrastructure

Mohammad Reza Nilforoush; Zeinab Zali; Massoud Reza Hashemi

Volume 9, Issue 1 , January 2022, Pages 31-44

http://dx.doi.org/10.22108/jcs.2022.131452.1086

Abstract
  The Internet of Things is a paradigm for connecting objects using a common set of network technologies. Implementing IoT by host-to-host communication models, such as IP, faces several ...  Read More
Research Article
Gaussian Linear Regression Crossover for Genetic Algorithms
Gaussian Linear Regression Crossover for Genetic Algorithms

Pezhman Gholamnezhad

Volume 9, Issue 1 , January 2022, Pages 45-56

http://dx.doi.org/10.22108/jcs.2022.131269.1084

Abstract
  In the simulated binary crossover, offspring are generated from parents with a coefficient of variation and uses a probability distribution function for the coefficient and there is ...  Read More
Research Article
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset

Ramin Atefinia; Mahmood Ahmadi

Volume 9, Issue 1 , January 2022, Pages 57-69

http://dx.doi.org/10.22108/jcs.2022.131400.1085

Abstract
  The increase in the use of the Internet and web services and the advent of the fifth generation of cellular network technology (5G) along with ever-growing Internet of Things (IoT) ...  Read More
Research Article
Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization
Adaptive Reinforcement-Based Genetic Algorithm for Combinatorial Optimization

Zahra Zojaji; Arefeh Kazemi

Volume 9, Issue 1 , January 2022, Pages 71-84

http://dx.doi.org/10.22108/jcs.2022.131709.1087

Abstract
  Combinatorial optimization is the procedure of optimizing an objective function over the discrete configuration space. A genetic algorithm (GA) has been applied successfully to solve ...  Read More
Research Article
DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table
DiCuPIT: Distributed Cuckoo Filter-based Pending Interest Table

Arman Mahmoudi; Mahmood Ahmadi

Volume 9, Issue 1 , January 2022, Pages 85-96

http://dx.doi.org/10.22108/jcs.2022.132747.1091

Abstract
  Named data networking is one of the recommended architectures for the future of the Internet. In this communication architecture, the content name is used instead of the IP address. ...  Read More
BAS: An Answer Selection Method Using BERT Language Model
BAS: An Answer Selection Method Using BERT Language Model

Jamshid Mozafari; Afsaneh Fatemi; Mohammad Ali Nematbakhsh

Volume 8, Issue 2 , July 2021, , Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.128002.1066

Abstract
  In recent years, Question Answering systems have become more popular and widely used by users. Despite the increasing popularity of these systems, their performance is not even sufficient ...  Read More
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices
Intrusion Detection in IoT With Logistic Regression and Artificial Neural Network: Further Investigations on N-BaIoT Dataset Devices

Fereshteh Abbasi; Marjan Naderan; Seyyed Enayatallah Alavi

Volume 8, Issue 2 , July 2021, , Pages 27-42

http://dx.doi.org/10.22108/jcs.2021.129807.1077

Abstract
  Due to the increasing development and applications of the Internet of Things (IoT), detection and prevention of intruders into the network and devices has gained much attention in the ...  Read More
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness
Momentum Contrast Self-Supervised Based Training for Adversarial Robustness

Monireh Moshavash; Mahdi Eftekhari; Kaveh Bahraman

Volume 8, Issue 1 , January 2021, , Pages 33-43

http://dx.doi.org/10.22108/jcs.2021.126680.1063

Abstract
  By the rapid progress of deep learning and its use in a variety of applications, however, deep networks have shown that they are vulnerable to adversarial examples. Recently developed ...  Read More
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Volume 8, Issue 1 , January 2021, , Pages 19-32

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to tackle ...  Read More
Model-Driven Software Engineering: A Bibliometric Analysis
Model-Driven Software Engineering: A Bibliometric Analysis

Hamed Barangi; Shekoufeh Kolahdouz Rahimi; Bahman Zamani; Ali Akbar Khasseh

Volume 8, Issue 1 , January 2021, , Pages 93-108

http://dx.doi.org/10.22108/jcs.2021.125400.1059

Abstract
  Model-Driven Software Engineering (MDSE) is a software development methodology that reduces the cost and production time of the final product by concentratingon a higher level of abstraction. ...  Read More
Research Article
Investigating the Effect of Cognitive Style on Programming Habits using data mining
Investigating the Effect of Cognitive Style on Programming Habits using data mining

zahra karimi; S.Fatemeh Noorani

Articles in Press, Accepted Manuscript, Available Online from 14 September 2022

http://dx.doi.org/10.22108/jcs.2022.134932.1105

Abstract
  Different programmers code in different ways. Knowing these habits and the human factors that affect them significantly impact teaching and task assignments in programming. This article ...  Read More
Research Article
New influence-aware centrality measures for influence maximization in social networks
New influence-aware centrality measures for influence maximization in social networks

Maryam Hosseini

Articles in Press, Accepted Manuscript, Available Online from 18 September 2022

http://dx.doi.org/10.22108/jcs.2022.134191.1100

Abstract
  Influence maximization in social networks is defined as determining a subset of seed nodes where triggering the influence diffusion through the social network leads to maximum number ...  Read More

Keywords Cloud