Journal of Information Assurance and Security (JIAS)

ISSN 1554-1010

 
line decor
  

 

 

 

 

A publication of
Machine Intelligence Research Labs (MIR Labs), USA
Editorial inquiries should be directed to the Editor-in-Chief

 


Member of crossref

 

 

 

 

 

 * Important Notice to all Readers and Prospective Authors *

From 2024, the journal has been successfully transferred to a new publisher, Cerebration Science Publishing. The journal's new website is currently being published in collaboration with Sciendo. Please submit all new articles using the link below: https://www.editorialmanager.com/jiaas/default.aspx. The old system is no longer accepting new submissions.

1.New Publisher: Cerebration Science Publishing Co. Limited)

2.Official Publisher Website: https://www.cspub-hk.org/

3. New Official Website:https://sciendo.com/pl/journal/IAS

4. Official Correspondence Email: jias@cspub-hk.org

Aim and Scope

The Journal of Information Assurance and Security (JIAS) is dedicated to advancing the understanding and practice of information assurance and security in an increasingly interconnected and data-driven world. Our primary aim is to provide a reputable platform for researchers, practitioners, and policymakers to publish and exchange cutting-edge research findings, innovative solutions, and insights related to safeguarding information assets and ensuring the privacy, integrity, and availability of digital information.

The scope of the Journal of Information Assurance and Security covers a wide range of topics within the field of information assurance and security, including but not limited to:

Cybersecurity: Research and developments in protecting computer systems, networks, and data from cyber threats, including malware, ransomware, and cyberattacks.

Data Privacy: Strategies, techniques, and regulations for safeguarding the privacy of sensitive and personal data, including GDPR and other privacy laws.

Information Risk Management: Approaches to identifying, assessing, and mitigating information security risks within organizations.

Cryptographic Techniques: Advances in encryption, hashing, and cryptographic protocols to secure data in transit and at rest.

Security Policies and Compliance: Best practices for developing and implementing security policies, compliance frameworks, and standards.

Network Security: Measures and technologies for protecting data during transmission and within networks, including intrusion detection and prevention systems (IDPS).

Incident Response and Recovery: Strategies and methodologies for responding to security incidents and recovering from data breaches.

Cloud Security: Security considerations and solutions for cloud computing environments, including securing cloud-based applications and data.

Internet of Things Security: Security challenges and solutions for IoT devices and ecosystems, including IoT device management and communication security.

Access Control and Authentication: Methods for ensuring that only authorized individuals or systems can access sensitive information.

Biometrics and Identity Management: Advancements in biometric authentication and identity management technologies.

Ethical Hacking and Penetration Testing: Techniques for assessing and strengthening the security of systems through ethical hacking and penetration testing.

Guidelines for Contributors

JIAS publishes two types of articles: regular papers and brief papers. Review management is primarily under the direction of an associate editor, who will solicit reviews for each submission. The associate editor will ordinarily make a recommendation after receiving three independent reviews. To avoid delays in processing your paper, please follow these guidelines.


Submission of Manuscripts (New Submission System - From May 01, 2009)

All correspondence concerning submissions is between the author and the Editor-in-Chief. To submit your paper for consideration, visit the web submission system found at:http://www.mirlabs.net/jias/submission

There you can create a new account or use an existing one if you have one, and submit a first draft of a new manuscript. JIAS is devoted primarily to archival reports of work that have not been published elsewhere. Specifically, conference records and book chapters that have been published previously are not acceptable unless and until they have been enhanced significantly. Please ensure that in the cover letter (comments to editor-in-chief)you state that the work being submitted has not been published elsewhere, nor is it under review currently by another publication. Please follow the style files given in the following links. Papers should not exceed a maximum of 20 pages.

Submitted papers must be in English and should not have been published elsewhere or being currently under consideration by any other journal. Authors should submit the electronic version of their papers in postscript or PDF formats via the journal web site. Authors should submit the electronic version of their papers in postscript or PDF formats via journal submission form. If you have any problems with the submission please send an email to the Managing Editor.

The final decision on publication is made by the Editor-in-Chief upon recommendation of an Associate Editor and / or an Editorial Board Member. If the manuscript is accepted for publication in JIAS, it must not be published in any periodical elsewhere without the permission of the Editor-in-Chief.


 

Abstracted/Indexed in

.Articles published in Journal of Information Assurance and Security are indexed or abstracted in: Emerging Sources Citation Index, Google Scholar, and INSPEC.

 

Copyright © 2005 - 2017,  Machine Intelligence Research Labs (MIR Labs), USA

 

No part of Journal of Information Assurance and Security may be reproduced or transmitted in any form or by any means without written permission from the publisher. Journal of Information Assurance and Security has been registered with the Copyright Clearance Center (CCC) Transactional Reporting Services. Consent is given for coping of articles for personal or internal use, or for the personal use of specific clients provided that the base fee $05.00 (per copy, per article) is paid directly to CCC, 27 Congress St., Salem, MA 01970, USA. For those organizations that have been granted a photo copy license by CCC, a separate system of payment has been arranged. The fee code for users of the Transactional Reporting Service is 1060 5369/93 $03.50.