Information and computer security are especially significant with the ubiquity of the internet and the rise of high-speed broadband networks. Information sharing among network users has caused countless invasions of privacy and security worldwide, with hackers demanding ransoms from organisations. This risk has generated enormous concern about security among internet users. IJICS is a double-blind refereed and authoritative reference which addresses information and computer security in computer/mobile networks. High-quality case studies, applications, novel ideas and survey papers are welcome.
Topics covered include
- Cyber security, cloud security, blockchain security
- AI/machine learning in security, data mining in security
- Malware and botnet detection, virus/worm controls
- Computer crime prevention/detection, digital/cyber forensics and analysis
- Confidentiality protection, cryptography and data protection
- Information warfare, denial of service protection, spoofing protection
- e-Commerce security; image, audio and video security
- Android/iOS security, database and data security
- Information ethics, privacy issues, information security
- Social media abuse detection, intrusion detection and prevention, network security
- Risk management, safety-critical systems
- Secure communications technology and computer systems
- Security control measures, policy models and authentication
- Software and hardware security architectures
- Wireless/mobile network and data security
More on this journal...
IJICS focuses on theory, design, implementation, analysis, and application of secure information and computer systems. Emphases will also be on the related social, political and economic issues as well as emerging issues of interest to legislators, professionals, researchers, academics, and technical community.
Professionals, researchers, legislators, academics, and technical community.
IJICS publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, notes, and commentaries. Contribution may be by submission or invitation, and suggestions for special issues and publications are welcome.
- 2022 Vol.18 No.3/4
- 2022 Vol.18 No.1/2
- 2022 Vol.17 No.3/4
- 2022 Vol.17 No.1/2
- 2021 Vol.16 No.3/4
- 2021 Vol.16 No.1/2
- 2021 Vol.15 No.4
- 2021 Vol.15 No.2/3
- 2021 Vol.15 No.1
- 2021 Vol.14 No.3/4
- 2021 Vol.14 No.2
- 2021 Vol.14 No.1
- 2020 Vol.13 No.3/4
- 2020 Vol.13 No.2
- 2020 Vol.13 No.1
- More volumes...
IJICS is indexed in:
- Scopus (Elsevier)
- Compendex [formerly Ei] (Elsevier)
- ACM Digital Library
- cnpLINKer (CNPIEC)
- DBLP Computer Science Bibliography
- Google Scholar
- Inspec (Institution of Engineering and Technology)
- ProQuest Advanced Technologies Database with Aerospace
IJICS is listed in:
More journal lists/directories...
Honorary Editor in Chief
- Li, Eldon Y., National Chung Cheng University, Chiayi, Taiwan, Province of China
Editor in Chief
- Issac, Biju, Northumbria University, UK
- Tso, Raylin, National Chengchi University, Taiwan, Province of China
- Chen, Chien-Ming, Harbin Institute of Technology, China
- Xiong, Hu, University of Electronic Science and Technology of China, China
Editorial Board Members
- Agrawala, Ashok K., University of Maryland, USA
- Amin, Massoud, University of Minnesota, USA
- Atluri, Vijay, Rutgers University, USA
- Bertino, Elisa, Purdue University, USA
- Burmester, Michael, Florida State University, USA
- Canas, Daniel, Wake Forest University, USA
- Chapin, Steve J., Syracuse University, USA
- Chen, Hsinchun, The University of Arizona, USA
- Chen, Jinjun, Swinburne University of Technology, Australia
- Davida, George, University of Wisconsin at Milwaukee, USA
- Davis, James A., Iowa State University, USA
- Denning, Dorothy, Naval Postgraduate School, USA
- Doi, Norihisa, Chuo University, Japan
- Frincke, Deborah A., Pacific Northwest National Laboratory, USA
- Ghosh, Anup K., USA
- Hinke, Thomas H., NASA Ames Research Center, USA
- Honavar, Vasant, Iowa State University, USA
- Imai, Hideki, Chuo University, Japan
- Irwin, J. David, Electrical and Computer Engineering Department, USA
- Jajodia, Sushil, Center for Secure Information Systems, USA
- Khosla, Pradeep, Department of Electrical and Computer Engineering and Information Networking Institute (INI), USA
- Killcrece, Georgia T., Carnegie Mellon University, USA
- Kim, Kwangjo, Information and Communications University, South Korea
- Ladd, David, Microsoft Research, USA
- Lam, Kwok-Yan, Nanyang Technological University, Singapore
- Lee, Der-Tsai, Academia Sinica, Taiwan, Province of China
- Lee, Ruby B., Princeton University, USA
- Liu, Ximeng, Singapore Management University, Singapore & Xidian University, Singapore
- Müller, Günter, Albert-Ludwig University of Freiburg, Germany
- Manaf, Azizah Abd, Universiti Teknologi Malaysia, Malaysia
- Martella, Giancarlo, University of Milano, Italy
- Mclean, John D., Naval Research Laboratory, USA
- Micali, Silvio, Massachusetts Institute of Technology, USA
- Miller, Les, Iowa State University, USA
- Ostrovsky, Rafail, University of California at Los Angeles, USA
- Palmer, Charles C., IBM T.J. Watson Research Center, USA
- Pieprzyk, Josef, Queensland University of Technology, Australia
- Porras, Phillip A., SRI International, USA
- Preneel, Bart, Katholieke Universiteit Leuven, Belgium
- Qing, Sihan, Chinese Academy of Sciences, China
- Reeves, Douglas, North Carolina State University, USA
- Rubin, Aviel, Johns Hopkins University, USA
- Safavi-Naini, Rei, University of Wollongong, Australia
- Samarati, Pierangela, Università degli Studi di Milano, Italy
- Shieh, Shiuhpyng, National Chiao Tung University, Taiwan, Province of China
- Spafford, Eugene, Purdue University, USA
- Staddon, Jessica, Palo Alto Research Center, USA
- Thuraisingham, Bhavani, University of Texas at Dallas, USA
- Ting, T.C., University of Connecticut, USA
- Tygar, Doug, University of California at Berkeley, USA
- Varadharajan, Vijay, Macquarie University, Australia
- Wallach, Dan S., Rice University, USA
- Warren, Mathew J., Deakin University, Australia
- Wong, Johnny, Iowa State University, USA
- Wool, Avishai, Tel Aviv University, Israel
- Wright, Rebecca, Rutgers University, USA
- Wu, Chwan-Hwa (John), Auburn University, USA
- Yang, Ming-Hour, Chung Yuan Christian University, Taiwan, Province of China
- Yang, Shuang-Hua, Loughborough University, UK
- Yu, Fang, National Chengchi University, Taiwan, Province of China
- Zeleznikow, John, Victoria University, Australia
A few essentials for publishing in this journal
- Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
- Conference papers may only be submitted if the paper has been completely re-written (more details available here) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
- Briefs and research notes are not published in this journal.
- All our articles go through a double-blind review process.
- All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.
- There are no charges for publishing with Inderscience, unless you require your article to be Open Access (OA). You can find more information on OA here.
- All articles for this journal must be submitted using our online submissions system.
- View Author guidelines.
- Submit here.
7 September, 2022
Research published in the International Journal of Information and Computer Security has looked at the everyday privacy and anonymisation settings in conventional web browsers and compared the enhanced functionality of browsers with greater and layered privacy control that can help hide one's legitimate activity from prying eyes, for instance. The notion of volatile memory forensics is considered a putative way to access at least some of that activity even with privacy-enhanced browsers once criminal investigators have timely access to the laptop or other device on which the browser is running. Privacy-enhanced web browsers help protect citizens using the internet from those who might wish to see details of their browsing habits and behaviour, perhaps relatives or so-called friends, but also government agencies with no right to access personal information, as well as third-parties with malicious intent, such as identity theft. The flip side of creating such browsers is that criminals too can use these tools to obfuscate their activities and to exploit potential victims of their crimes. The very nature of a privacy-enhanced browser might then make it very difficult for the police to investigate a crime where such a browser has been central to the activity. Nilay R. Mistry, Krupa Gajjar, and S.O. Junare of the National Forensic Sciences University in Gandhinagar, Gujarat, India, explain how digital forensics is central to many a criminal investigation whether the crime happens online or offline. Critically, the wider concept of computer forensics must be able to identify, acquire, preserve, and analyse evidence from a device so that it can be presented in a court of law with the provenance that it is exactly as it was found on the device an so representative of the perpetrator's behaviour [...]
Blockchain contracts to build botnets
9 March, 2022
A new study in the International Journal of Information and Computer Security, shows how blockchain technology and smart contracts might be exploited to create a distributed network of computers. Such a network, lacking a central server, could be used to build a botnet, a system for attacking and hacking other online resources for criminal gain or other malicious purposes. The proof of principle offered by Omar Alibrahim of Kuwait University in Safat, Kuwait and Majid Malaika of omProtect LLC in Washington DC, USA, should offer fair warning to those running potentially vulnerable computer systems to be on the alert from a new type of attack from bot contracts, "botracts". They point out that commands added into a blockchain-based smart contract cannot be removed nor modified making a botract highly resilient to any attempt to disarm it by security experts [...]