About the Journal
The Journal of Computation and Information Security (JCIS) is an open-access, freely accessible publication journal that promotes publications from researchers and practitioners that focus on integration principles in the computation strategies of complex systems. JCIS is a peer-reviewed open-access journal that delivers all existing and most recent developments in the theoretical, computational, and practical approaches to emphasize principled aspects of computation and information security.
Focus and Scope
JCIS features a wide range of articles on all aspects of computer and information security, including, but not limited to:
- Cryptographic techniques and protocols
- Network security, intrusion detection
- Secure software engineering
- Data privacy and protection
- Quantum cryptography
- Artificial intelligence (AI) in cyber security
- Blockchain Technology And Uses
- Cyber-physical systems security
- Ensure security in cloud computing, IoT
We invite all types of research works: original articles, review papers, case studies, and technical notes that will contribute to the knowledge in these fields.
Open Access Policy
We are, in general, adherents to the principle of open knowledge, and we publish this journal under open access. Open access means that each published article is open to the readers and can boost its visibility within the global scientific community. All articles are copyrighted by authors and journals, whose personal licenses must be honored, and are subject to wide dissemination via open-access content distribution.
Copyright Notice
Those who publish with JCIS agree to the following terms:
Authors retain copyright of their work, with first publication rights granted to the journal. It is an open-access article distributed under the terms of a Creative Commons Attribution License. It allows all reproduction and distribution, provided authors are credited for their contributions and publications.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after publication, as it can lead to productive exchanges. If accepted for publication by this journal: - Authors may self-archive an author-created version of its articles even on a public non-commercial repository such as HAL if they provide an acknowledgment that takes into account all citations, including links.
Sponsorship and Disclosure
JCIS is published by Transitus, a renowned academic and professional publishing firm dedicated to disseminating outstanding knowledge via exceptional publications. Our model of immediate free access with suitable APC charges is sustainable by those who kindly sponsor and partner with us.
Archiving Policy
JCIS is committed to making a long-term future of its published content. The periodical is part of LOCKSS (Lots of Copies Keep Stuff Safe) and CLOCKSS, presenting a long-term preservation solution for our content.
Privacy Statement
JCIS is committed to ensuring the privacy of authors, reviewers, and readers. The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party. We scrupulously follow international standards for data protection.
Call for Papers and Reviewers
Please consider submitting your papers to JCIS and join our active community-leading computation and information security innovation. We also invite experts in the field to become a part of our reviewer team and contribute their wisdom towards ensuring that all articles published meet high standards of quality, rigor, and clarity.
We hope to be able to publish some of your work in the Journal of Computation and Information Security (JCIS).