Global Journal of Information Security and Cyber Criminology

Print Frequency : Biannually

Basic Information


Journal Name [English] Global Journal of Information Security and Cyber Criminology
Print ISSN NA
Online ISSN 2581-7744
Publisher's Url http://technology.eure...
Subject Engineering
Frequency Biannually
Access Free


Journal Description


Global Journal of Information Security and Cyber Criminology has been conceptualized for effective dissemination and promulgation of original research in all fields of Information Security and Cyber Criminology. With a relentless pursuit of excellence, it aims at providing immaculate and superior research material, thus fostering the spirit of non-conformity, experimentation and de novo intellection among researchers in different parts of the world. "Global Journal of Information Security and Cyber Criminology" strives ardently to present inceptive, innovative and invaluable research developments, both application oriented and theoretical, in all possible domains of Information Security and Cyber Criminology to a broad audience of academic researchers and industry practitioners in all major faculties - research and development, management, strategic planning, purchasing, design & styling, marketing, human resources etc. Ingeniousness and research impaction are the main parameters for evaluation of theoretical papers. Applications based on advanced theory and case studies aid in bridging the gap between theory and practice, and are particularly welcome. General approaches, formalisms, algorithms or techniques should be complemented with lucid illustrations allowing easy comprehension and subsequent suitable applicability. Although the main emphasis of "Global Journal of Information Security and Cyber Criminology" is on original research papers, theoretical and integrative review articles, book reviews, and high-quality position papers are also published to keep readers up-to-date on the latest ideas, designs, and developments in these allied fields. Special review articles will be granted consideration based on the stage of evolvement of their respective fields. Although there is no restriction on the length of contributions, brevity will always be preferred. Brief articles will merit attention depending on their technical proficiency. Discussions of previously published papers are also welcome. Focus & Scope The focus and scope of Global Journal of Information Security and Cyber Criminology has been categorized as follows: Information Security: Access Control Anti-Virus and Anti-Worms Authentication and Authorization Artificial Intelligence Techniques for ISS and Engineering Biometric Security Biometrics Content Protection Cyber security, Warfare, Defence and policies Cryptography and Cryptanalysis Clouds and Virtual Machine Security Critical Information and Infrastructure Security Cryptographic software and hardware for embedded systems Coding theory and applications of finite fields Data and System Integrity Database Security Distributed Systems Security Digital Forensics, Procedures, Tools & Techniques Data Privacy, Privacy Theory and Engineering Ethical Hacking Electronic Commerce Security e-Governance and e-Government Security E-Sign and Public Key Infrastructure Fraud Control Future Directions and Challenges in ISS Grid Security IoT and Industry 4.0 Information Security Audits Information Hiding and Watermarking Information Privacy Information Security Science (ISS) and Engineering Intellectual Property Protection Intrusion Detection and Prevention Systems Key and Identity Management Trust Models Key Management and Key Recovery Language-based Security M2M Security Malicious Software Threats and Protection Mobile Communication and Application Security Network Security Operating System Security Public Awareness and Education for ISS Penetration Tests, Tools and Techniques Risk Evaluation and Security Certification Social Engineering Attacks and Prevention Signature and Key Agreement Protocol Steganography and Steganalysis Surveillance Technology Software Security System Security Security Evaluation Security for Mobile Computing Security Models Security Protocols Security and Privacy for Social Computing Security Risk Analysis, Modelling, Evaluation and Management Security Weaknesses on Information and Communication Secure Coding, Source Code Auditing and Review Security Standards, Protocols and Policies Securing Digital Rights and Management Securing Mobile Networks and Devices Smart Card, RFID, NFC, 3G, 4G, etc. Security Trusted Computing and Trustworthy Computing Technology Wireless, Ad Hoc and Sensor Network Security Web and Web Application Security Cyber Criminology: Cyber Crime Cyber Victims Cyber Policy CybercrimeLaw Cyber Pornography Cyber Investigations Cyber Psychopathology Cyber-Criminal Behaviour Cyber Offender Behaviour Copyright and Intellectual Property Law Developing Cyber Safety Policy Detection of Distributed Denial of Service Attacks Forms of Cyber Crime Geographical Aspects of Cyber Crime Internet Fraud and Identity Theft Impact of Cyber Crimes in the Real World International Perspectives of Cyber Crime Mobile Phone Safety and Policy Issues Online Gambling Policing Cyber Space Privacy &Anonymity on the Net