Information Security
IJCSIS seeks papers describing significant research contributions to the field of information security. We invite submissions on a wide range of IT security research, including, but not limited to:
Risk and security management
IT-Governance, Risks and compliance
Data security services
E-mail communication confidentiality protection
Internet security and content cloud services
information security practices and systems
Security frameworks, architectures and protocols
Formal aspects of security
Security protocols
Performance and security
Software design security
Middleware security
Intrusion detection systems
Security, trust and privacy metrics;
Public Key Infrastructure (PKI)
Intrusion detection and event correlation
Firewalls
Trust management
Software security assurance
Applied cryptography
Smart cards
Biometrics
Digital rights management
Electronic surveillance
Database security
Internet security
Security in wireless
Sensor/cellular network security
Ad hoc network security
Security in peer-to-peer networks
Security in wireless multimedia systems
Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.)
Information hiding
Anonymity
Authentication
Access control
Data Integrity
Security data mining
Data confidentiality and integrity
Secure service discovery
Secure location-based service
Business continuity and disaster recovery
Security threats
Vulnerability analysis and countermeasures
Denial of service attacks
Open-source anti-malware
Digital signatures
Legal aspects /identity theft, privacy, etc./
Detecting forensics analysis
Anti-forensics tools
Network anti-forensics tools
Data mining and visualization
Forensics
Privacy and protection for Smart Home Security
Security and privacy in dynamic environments