Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

8

Number of Issues

21

Number of Articles

102

Number of Contributors

209

Article View

79,540

PDF Download

19,729

View Per Article

779.8

PDF Download Per Article

193.42

-----------------------------------------

Number of Submissions

329

Rejected Submissions

45

Reject Rate

14

Accepted Submissions

95

Acceptance Rate

29

Number of Indexing Databases

8

Number of Reviewers

378

 http://jcomsec.org


Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

NOTE: Submissions to this journal are free of charge.

 

 

Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)
1. Bit-Parallel ECC Coprocessor resistant to Differential Power Analysis Attacks in GF(2m)

Hashem Rezaei; Alireza Shafieinejad

Volume 8, Issue 1 , Winter and Spring 2021, Pages 1-18

http://dx.doi.org/10.22108/jcs.2021.123698.1051

Abstract
  Elliptic curve cryptography (ECC) is one of the most popular public key systems in recent years due to its both high security and low resource consumption. Thus, ECC is more appropriate ...  Read More
Formalizing the main characteristics of QVT-based model transformation languages
1. Formalizing the main characteristics of QVT-based model transformation languages

Alireza Rouhi; Kevin Lano

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 35-62

http://dx.doi.org/10.22108/jcs.2020.121740.1047

Abstract
  Model-Driven Development (MDD) aims at developing software more productively by using models as the main artifacts. Here, the models with high abstraction levels must be transformed ...  Read More
A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO
2. A Lightweight Anomaly Detection Model using SVM for WSNs in IoT through a Hybrid Feature Selection Algorithm based on GA and GWO

Azam Davahli; mahboubeh shamsi; Golnoush Abaei

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 63-79

http://dx.doi.org/10.22108/jcs.2020.119468.1033

Abstract
  As a result of an incredibly fast growth of the number and diversity of smart devices connectable to the internet, commonly through open wireless sensor networks (WSNs) in internet ...  Read More
A Risk Estimation Framework for Security Threats in Computer Networks
3. A Risk Estimation Framework for Security Threats in Computer Networks

Razieh Rezaee; Abbas Ghaemi Bafghi

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 19-33

http://dx.doi.org/10.22108/jcs.2020.120412.1038

Abstract
  In security risk management of computer networks, some challenges are more serious in large networks. Specifying and estimating risks is largely dependent on the knowledge of security ...  Read More
Generating dynamical S-boxes using 1D Chebyshev chaotic maps
4. Generating dynamical S-boxes using 1D Chebyshev chaotic maps

Ali Shakiba

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 1-17

http://dx.doi.org/10.22108/jcs.2020.116547.1023

Abstract
  This paper considers the construction of chaotic dynamic substitution boxes (S-boxes) using chaotic Chebyshev polynomials of the first kind. The proposed algorithm provides dynamic ...  Read More
Mining Association Rules from Semantic Web Data without User Intervention
5. Mining Association Rules from Semantic Web Data without User Intervention

Reza Ramezani; Mohammad Ali Nematbakhsh; Mohamad Saraee

Volume 7, Issue 1 , Winter and Spring 2020, , Pages 81-94

http://dx.doi.org/10.22108/jcs.2020.121763.1046

Abstract
  With the introduction and standardization of the semantic web as the third generation of the web, this technology has attracted and received more human attention than ever. Thus, the ...  Read More
Automatic Black-box Detection of Resistance against CSRF Vulnerabilities in Web Applications
1. Automatic Black-box Detection of Resistance against CSRF Vulnerabilities in Web Applications

Mohammad Ali Hadavi; Samira Sadeghi

Articles in Press, Accepted Manuscript, Available Online from 29 May 2021

http://dx.doi.org/10.22108/jcs.2021.127261.1064

Abstract
  Cross-Site Request Forgery (CSRF) is an attack in which an infected website causes a victim's browser to perform an unwanted operation on a trusted website. The main solution to ...  Read More

Keywords Cloud