Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Number of Volumes

10

Number of Issues

25

Number of Articles

132

Number of Contributors

261

Article View

104,487

PDF Download

33,905

View Per Article

791.57

PDF Download Per Article

256.86

-----------------------------------------

Number of Submissions

176

Rejected Submissions

71

Reject Rate

28

Accepted Submissions

121

Acceptance Rate

58

Number of Indexing Databases

8

Number of Reviewers

436

Journal of Computing and Security (JCS) is a peer-reviewed scientific journal which is committed to publication of original results in all areas of modern computing as well as information security.

We are pleased to invite you to submit your original English article(s), which is neither previously published nor under consideration for review or publication elsewhere. This journal is following of committee on publication Ethics (cope) and complies with the highest ethical standards in accordance with ethical laws. The notification of the first decision is sent in at most four months period from the date of submission to expedite the publication process.

The published issues are in English and distributed worldwide in open access fashion.  

All the received manuscripts, before sending for the reviewing process, will be checked by plagiarism software. Journal of Computing and Security (JCS) uses systems and software similar to turnitin, Grammarly, Hamanandjou, iThenticate, SID, Google Scholar, Google, Magiran, to ensure that articles are not duplicated.

This journal has been recieved articles from 2014. 

NOTE: Submissions to this journal are free of charge.

Research Article
RSAM: A Questionnaire for Ransomware Security Awareness Measurement
RSAM: A Questionnaire for Ransomware Security Awareness Measurement

Fakhroddin Noorbehbahani; Anahita Taghiyar; Azadeh Rezvani

Volume 10, Issue 1 , January 2023, Pages 1-15

https://doi.org/10.22108/jcs.2022.134927.1104

Abstract
  Today ransomware is a significant security threat to both organizations and humans in the e-commerce and digital era. Poor human security awareness is a critical vulnerability that ...  Read More
Research Article
Gamifault: A Gamified Motivational Framework for Software Debugging Process
Gamifault: A Gamified Motivational Framework for Software Debugging Process

Shahrzad Sadat Mousavi Esfahani; Mojtaba Vahidi-Asl; Alireza Khalilian; Parastoo Alikhani; Bardia Abhari

Volume 10, Issue 1 , January 2023, Pages 17-33

https://doi.org/10.22108/jcs.2023.135012.1107

Abstract
  The released software systems still involve some faults, for which debugging becomes necessary. On the one hand, manual software debugging remains an arduous, time-consuming, and expensive ...  Read More
Gamifault: A Gamified Motivational Framework for Software Debugging Process
Gamifault: A Gamified Motivational Framework for Software Debugging Process

Shahrzad Sadat Mousavi Esfahani; Mojtaba Vahidi-Asl; Alireza Khalilian; Parastoo Alikhani; Bardia Abhari

Volume 10, Issue 1 , January 2023, , Pages 17-33

https://doi.org/10.22108/jcs.2023.135012.1107

Abstract
  The released software systems still involve some faults, for which debugging becomes necessary. On the one hand, manual software debugging remains an arduous, time-consuming, and expensive ...  Read More
Illegal Miner Detection based on Pattern Mining: A Practical Approach
Illegal Miner Detection based on Pattern Mining: A Practical Approach

Maryam Amiri; Hesam Askari

Volume 9, Issue 2 , July 2022, , Pages 1-10

https://doi.org/10.22108/jcs.2022.133306.1096

Abstract
  Since the most critical constituent of the cost of cryptocurrency production is energy bills, the use of illegal electricity in cryptocurrency mining farms is very common. Illegal mining ...  Read More
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks
New Influence-Aware Centrality Measures for Influence Maximization in Social Networks

Maryam Hosseini-Pozveh

Volume 9, Issue 2 , July 2022, , Pages 23-38

https://doi.org/10.22108/jcs.2022.134191.1100

Abstract
  Influence maximization in social networks is defined as determining a subset of seed nodes where triggering the influence diffusion through the social network leads to the maximum number ...  Read More
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset
Performance Evaluation of Apache Spark MLlib Algorithms on an Intrusion Detection Dataset

Ramin Atefinia; Mahmood Ahmadi

Volume 9, Issue 1 , January 2022, , Pages 57-69

https://doi.org/10.22108/jcs.2022.131400.1085

Abstract
  The increase in the use of the Internet and web services and the advent of the fifth generation of cellular network technology (5G) along with ever-growing Internet of Things (IoT) ...  Read More
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits
Using Data Mining to Investigate the Effect of Cognitive Style on Programming Habits

Zahra Karimi; S.Fatemeh Noorani

Volume 9, Issue 2 , July 2022, , Pages 11-22

https://doi.org/10.22108/jcs.2022.134932.1105

Abstract
  Different programmers code in different ways. Knowing these habits and the human factors that affect them significantly impacts teaching and task assignments in programming. This article ...  Read More
Research Article
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection
Summarization Algorithm for Data Stream to Speed up Outlier Data Detection

Hadid Mollashahi; Hamid Saadatfar; Hamed Vahdatnejad

Articles in Press, Accepted Manuscript, Available Online from 15 March 2023

https://doi.org/10.22108/jcs.2023.135054.1109

Abstract
  Outlier detection in data streams is an essential issue in the data processing. Today, due to the massive growth of streaming data generated by the spread of the Internet of Things, ...  Read More
Research Article
Development of a CGAN-based method for aspect level text generation: encouragement and punishment factors in the aspect knowledge
Development of a CGAN-based method for aspect level text generation: encouragement and punishment factors in the aspect knowledge

Mohammadreza Shams; Maryam Lotfi Shahreza; Amir Masoud Soltani

Articles in Press, Accepted Manuscript, Available Online from 03 April 2023

https://doi.org/10.22108/jcs.2023.135317.1113

Abstract
  Text mining systems may benefit from the use of automated text generation, especially when dealing with limited datasets and linguistic resources. Most successful text generation approaches ...  Read More
Research Article
A new PageRank-based method for influence maximization in signed social networks
A new PageRank-based method for influence maximization in signed social networks

Maryam Hosseini-Pozveh; Maryam Lotfi Shahreza

Articles in Press, Accepted Manuscript, Available Online from 09 May 2023

https://doi.org/10.22108/jcs.2023.136555.1119

Abstract
  Influence maximization is one of the most important topics in the social network analysis field. As all the social networks can be considered signed, explicitly or implicitly, assessing ...  Read More

Keywords Cloud