Information Security

IJCSIS seeks papers describing significant research contributions to the field of information security. We invite submissions on a wide range of IT security research, including, but not limited to:

Risk and security management

IT-Governance, Risks and compliance

Data security services

E-mail communication confidentiality protection

Internet security and content cloud services

information security practices and systems

Security frameworks, architectures and protocols

Formal aspects of security

Security protocols

Performance and security

Software design security

Middleware security

Intrusion detection systems

Security, trust and privacy metrics;

Public Key Infrastructure (PKI)

Intrusion detection and event correlation

Firewalls

Trust management

Software security assurance

Applied cryptography

Smart cards

Biometrics

Digital rights management

Electronic surveillance

Database security

Internet security

Security in wireless

Sensor/cellular network security

Ad hoc network security

Security in peer-to-peer networks

Security in wireless multimedia systems

Security in different networks (mesh, personal, local, metropolitan, GSM, Bluetooth, WiMax, IEEE 802.x, etc.)

Information hiding

Anonymity

Authentication

Access control

Data Integrity

Security data mining

Data confidentiality and integrity

Secure service discovery

Secure location-based service

Business continuity and disaster recovery

Security threats

Vulnerability analysis and countermeasures

Denial of service attacks

Open-source anti-malware

Digital signatures

Legal aspects /identity theft, privacy, etc./

Detecting forensics analysis

Anti-forensics tools

Network anti-forensics tools

Data mining and visualization

Forensics

Privacy and protection for Smart Home Security

Security and privacy in dynamic environments

Editorial Board

Dr. Hala Al-Baroodi, University of Bahgdad, Iraq [Profile Link]