Research breakthrough possible @S-Logix pro@slogix.in

Office Address

Social List

Computers & Security - Elsevier | 2023 Impact Factor:5.6 | Cite Score:10.1 | Q1

Computers & Security Journal

Impact Factor and Journal Rank of Computers & Security

About:

Computers & Security is a peer-reviewed journal published by Elsevier. It focuses on research related to computer security, information security, and cybersecurity. The journal provides a platform for scholars, researchers, and practitioners to publish original research articles, reviews, and case studies that advance the understanding and application of security measures in computing systems.

Objective: The primary objective of Computers & Security is to promote research and innovation in the field of computer and information security. The journal aims to explore theories, methodologies, and applications that enhance the protection of computer systems, networks, and data from unauthorized access, attacks, and breaches. By publishing high-quality research, the journal contributes to the advancement of cybersecurity practices and technologies.

Interdisciplinary Focus: Computers & Security adopts an interdisciplinary approach, welcoming contributions from various fields related to computer and information security, including but not limited to, Cryptography, Network Security, Cybersecurity, Information Assurance, Risk Management, Security Protocols, Data Protection, Privacy, Forensics, Cyber Threat Intelligence. This interdisciplinary perspective fosters collaboration and innovation, leading to the development of advanced security techniques and practices that address complex cybersecurity challenges.

Global Reach and Impact: With a broad international readership and authorship, Computers & Security has a global reach and impact. Its publications contribute to the dissemination of knowledge and advancements in computer and information security worldwide. The journal content influences both academic research and practical applications, driving progress in areas such as secure software development, threat detection, incident response, and compliance with security standards and regulations.

High Standards and Rigorous Review: Maintaining high academic standards, Computers & Security conducts a rigorous peer-review process. Each submitted manuscript undergoes thorough evaluation by experts in the field to ensure the quality, originality, and scientific rigor of the research. This stringent review process upholds the integrity and reputation of the journal, ensuring that only high-quality and impactful research is published.

Significance: Computers & Security plays a significant role in advancing research and practice in the field of computer and information security. By providing a platform for the publication of cutting-edge research findings, the journal contributes to the growth of knowledge and innovation in cybersecurity. It serves as an essential resource for researchers, practitioners, and policymakers seeking to leverage security technologies and practices to protect digital assets, safeguard privacy, and ensure the resilience of critical information systems in an increasingly interconnected world.

Journal Home:  Journal Homepage

Editor-in-Chief:  Eugene Spafford

scope: The Computers & Security journal, published by Elsevier, is a premier peer-reviewed publication dedicated to the field of computer security. It provides a critical platform for researchers, practitioners, and academicians to disseminate their latest research findings, methodologies, and advancements in cybersecurity and information assurance. Here is an overview of its key focus areas and scope:

1. Network Security:
Research on securing communication networks, including local area networks (LANs), wide area networks (WANs), and wireless networks.
Studies on intrusion detection and prevention systems (IDS/IPS), network protocols security, and mitigation of network-based attacks.

2. Cryptography and Encryption:
Advancements in cryptographic algorithms, encryption techniques, and secure key management practices.
Research on cryptanalysis, public-key infrastructure (PKI), and emerging cryptographic protocols for data protection.

3. Cybersecurity Threats and Vulnerabilities:
Exploration of various cybersecurity threats, including malware, ransomware, phishing, and advanced persistent threats (APTs).
Studies on vulnerability assessment, threat modeling, and security risk management.

4. Information Assurance and Data Protection:
Research on methodologies and technologies for ensuring the confidentiality, integrity, and availability of information.
Studies on data protection strategies, secure data storage, and compliance with data privacy regulations such as GDPR and CCPA.

5. Security in Cloud Computing:
Advancements in securing cloud computing environments, including cloud infrastructure, platforms, and services.
Research on cloud security models, virtualization security, and secure cloud data management.

6. Application Security:
Exploration of secure software development practices, including secure coding, software testing, and vulnerability mitigation in applications.
Studies on application security frameworks, web application security, and mobile application security.

7. Identity and Access Management (IAM):
Research on identity management systems, authentication mechanisms, and access control policies.
Studies on multi-factor authentication (MFA), biometrics, and role-based access control (RBAC) for securing digital identities.

8. Security Governance and Compliance:
Exploration of security governance frameworks, policies, and best practices for organizational security management.
Research on compliance with cybersecurity standards, regulations, and audit practices.

9. Cybersecurity Education and Training:
Advancements in cybersecurity education, training programs, and awareness initiatives.
Studies on developing cybersecurity curricula, certification programs, and skills development for cybersecurity professionals.

10. Security in Emerging Technologies:
Research on securing emerging technologies such as the Internet of Things (IoT), blockchain, artificial intelligence (AI), and machine learning (ML).
Studies on the security challenges and solutions associated with the deployment and integration of these technologies.

11. Incident Response and Digital Forensics:
Exploration of incident response strategies, methodologies, and tools for detecting and mitigating security breaches.
Research on digital forensics techniques, evidence collection, and forensic analysis for investigating cyber incidents.

12. Human Factors in Security:
Research on the human aspects of cybersecurity, including user behavior, social engineering, and human-computer interaction (HCI) in security contexts.
Studies on security awareness, training effectiveness, and the psychological factors influencing security practices.

Print ISSN:  0167-4048

Electronic ISSN:  1872-6208

Abstracting and Indexing:  Science Citation Index Expanded, Scopus.

Imapct Factor 2023:  5.6

Subject Area and Category:  Computer Sciences, Law and Jurisprudence

Publication Frequency:  Bimonthly

H Index:  125

Best Quartile:

Q1:  Computer Science (miscellaneous)

Q2:  

Q3:  

Q4:  

Cite Score:  12.4

SNIP:  2.163

Journal Rank(SJR):  1.566

Guidelines for Authors: Computers & Security Author Guidelines

Publisher:  Elsevier

Country:  United Kingdom