Global Journal of Information Security and Cyber Criminology

Computer Science Journals:
IJRDCTSA
IJETMSSC
GJADSIT
JRICCVWA
IJCST
Electronics & Communication:
IJCRESVT
JETECE
IJWNMCI
IJRIMMA
IJATMEET
Electrical Engineering:
IJRAIEEE
IJRASIP
IJRIICE
IJETPEPSO
GJECECIT
Mechanical Engineering:
IJETMPE
IJCRMMME
IJRIMHIA
IJCAMDM
GJRAAMMD
Information Technology:
IJITIT
IJISCC
IJMIPPR
IJIOCAAIML
GJAITKM
Civil Engineering:
IJRDCEE
IJERGERS
IJRDITEUP
IJCRWRRD
GJETSCE
Architecture:
Architects International
IJCAI
IJADIP
GJEPAH
GJCRUARP
Automotive Engineering:
IJATATM
IJRIAAE
Multi-Disciplinary (Engineering & Technology):
IJISRIT
Young Scientist
GJAPTM
IJFTTEIT
IJAESTRA
Nano-Bio Trends
Management Journals:
IJTOMM
IJHOMIT
IJEFRA
IJBMIT
IJRAITM
IJTMJMC
GJIBED
IJETIKM
IJPFLT
IJTAAT
GJBIMIT
GJRABFMI
GJRIEBCRM
IJTTHMCH
Corporate International
Science Journals:
IJRIAPA
IJCRACCE
IJTAMS
IJRABN
IJARLIS
IJITLCJ
JRIFSN
IJBBRA
Medical/Pharmacy Journals:
IJRAMPR
IJCTDDIP
IJCRMMS
RRPSPI
IJTPFCH
IJPSNSRR
IJANSPHCI
IJPCDRI
ART's Journals:
IJHSSIT
IJTEE
JRAPP
IJCRECS
GJEEAET
GJTLHRSJ
The ARTist
Insights & Transformations in Research (ITR) Journals:
IIIRJ
JST International
Reinvention International
Hindi Journals:
Shodh International
Sameeksha
The Anveshan

Global Journal of Information Security and Cyber Criminology

Global Journal of Information Security and Cyber Criminology has been conceptualized for effective dissemination and promulgation of original research in all fields of Information Security and Cyber Criminology. With a relentless pursuit of excellence, it aims at providing immaculate and superior research material, thus fostering the spirit of non-conformity, experimentation and de novo intellection among researchers in different parts of the world.

"Global Journal of Information Security and Cyber Criminology" strives ardently to present inceptive, innovative and invaluable research developments, both application oriented and theoretical, in all possible domains of Information Security and Cyber Criminology to a broad audience of academic researchers and industry practitioners in all major faculties - research and development, management, strategic planning, purchasing, design & styling, marketing, human resources etc.

Ingeniousness and research impaction are the main parameters for evaluation of theoretical papers. Applications based on advanced theory and case studies aid in bridging the gap between theory and practice, and are particularly welcome.

General approaches, formalism's, algorithms or techniques should be complemented with lucid illustrations allowing easy comprehension and subsequent suitable applicability. Although the main emphasis of "Global Journal of Information Security and Cyber Criminology" is on original research papers, theoretical and integrative review articles, book reviews, and high-quality position papers are also published to keep readers up-to-date on the latest ideas, designs, and developments in these allied fields. Special review articles will be granted consideration based on the stage of evolvement of their respective fields.

Although there is no restriction on the length of contributions, brevity will always be preferred. Brief articles will merit attention depending on their technical proficiency.

Discussions of previously published papers are also welcome.

Focus & Scope

The focus and scope of Global Journal of Information Security and Cyber Criminology has been categorized as follows:

Information Security:

  • Access Control
  • Anti-Virus and Anti-Worms
  • Authentication and Authorization
  • Artificial Intelligence Techniques for ISS and Engineering
  • Biometric Security
  • Biometrics
  • Content Protection
  • Cyber security, Warfare, Defence and policies
  • Cryptography and Cryptanalysis
  • Clouds and Virtual Machine Security
  • Critical Information and Infrastructure Security
  • Cryptographic software and hardware for embedded systems
  • Coding theory and applications of finite fields
  • Data and System Integrity
  • Database Security
  • Distributed Systems Security
  • Digital Forensics, Procedures, Tools & Techniques
  • Data Privacy, Privacy Theory and Engineering
  • Ethical Hacking
  • Electronic Commerce Security
  • e-Governance and e-Government Security
  • E-Sign and Public Key Infrastructure
  • Fraud Control
  • Future Directions and Challenges in ISS
  • Grid Security
  • IoT and Industry 4.0
  • Information Security Audits
  • Information Hiding and Watermarking
  • Information Privacy
  • Information Security Science (ISS) and Engineering
  • Intellectual Property Protection
  • Intrusion Detection and Prevention Systems
  • Key and Identity Management Trust Models
  • Key Management and Key Recovery
  • Language-based Security
  • M2M Security
  • Malicious Software Threats and Protection
  • Mobile Communication and Application Security
  • Network Security
  • Operating System Security
  • Public Awareness and Education for ISS
  • Penetration Tests, Tools and Techniques
  • Risk Evaluation and Security Certification
  • Social Engineering Attacks and Prevention
  • Signature and Key Agreement Protocol
  • Steganography and Steganalysis
  • Surveillance Technology
  • Software Security
  • System Security
  • Security Evaluation
  • Security for Mobile Computing
  • Security Models
  • Security Protocols
  • Security and Privacy for Social Computing
  • Security Risk Analysis, Modelling, Evaluation and Management
  • Security Weaknesses on Information and Communication
  • Secure Coding, Source Code Auditing and Review
  • Security Standards, Protocols and Policies
  • Securing Digital Rights and Management
  • Securing Mobile Networks and Devices
  • Smart Card, RFID, NFC, 3G, 4G, etc. Security
  • Trusted Computing and Trustworthy Computing Technology
  • Wireless, Ad Hoc and Sensor Network Security
  • Web and Web Application Security

 Cyber Criminology:

  • Cyber Crime
  • Cyber Victims
  • Cyber Policy
  • CybercrimeLaw
  • Cyber Pornography
  • Cyber Investigations
  • Cyber Psychopathology
  • Cyber-Criminal Behaviour
  • Cyber Offender Behaviour
  • Copyright and Intellectual Property Law
  • Developing Cyber Safety Policy
  • Detection of Distributed Denial of Service Attacks
  • Forms of Cyber Crime
  • Geographical Aspects of Cyber Crime
  • Internet Fraud and Identity Theft
  • Impact of Cyber Crimes in the Real World
  • International Perspectives of Cyber Crime
  • Mobile Phone Safety and Policy Issues
  • Online Gambling
  • Policing Cyber Space
  • Privacy &Anonymity on the Net

 

 

Sample Author Certificate

 

Important Notic

Attention to Authors

Call for Paper For coming issue of "Global Journal of Information Security and Cyber Criminology"