Aims & Scope

Network and Information Security(NIS) is an international, peer-reviewed, open-access journal dedicated to publishing high-quality, original research articles, review papers, and case studies in the fields of network and information security. The journal aims to provide a platform for researchers, academicians, and industry professionals to share innovative research, advanced methodologies, and practical applications that enhance the security and integrity of networked systems and information.

Scope of the Journal:

  1. Network Security:

    • Intrusion detection and prevention systems
    • Network protocols and architectures
    • Secure communication protocols
    • Wireless and mobile network security
    • Internet of Things (IoT) security
  2. Information Security:

    • Data encryption and cryptography
    • Secure data storage and management
    • Access control and authentication
    • Privacy-preserving technologies
    • Digital forensics and incident response
  3. Cybersecurity:

    • Cyber threat intelligence and analysis
    • Malware detection and mitigation
    • Security in cloud computing
    • Cyber-physical system security
    • Cybersecurity policy and governance
  4. Application Security:

    • Secure software development lifecycle
    • Application vulnerability assessment
    • Web and mobile application security
    • Security in embedded and real-time systems
    • Secure coding practices
  5. Security Management:

    • Risk assessment and management
    • Security compliance and auditing
    • Security metrics and performance evaluation
    • Business continuity and disaster recovery
    • Security awareness and training
  6. Emerging Technologies and Trends:

    • Blockchain and distributed ledger technologies
    • Artificial intelligence and machine learning in security
    • Quantum computing and post-quantum cryptography
    • 5G network security
    • Security challenges in emerging technologies
  7. Interdisciplinary Research:

    • Security in social networks and media
    • Human factors and usability in security
    • Legal and ethical issues in network and information security
    • Cross-disciplinary approaches to security
    • Innovations and future trends in security research

Submission Types: The journal welcomes a variety of submission types, including but not limited to:

  • Original research articles
  • Comprehensive review papers
  • Case studies and application reports
  • Technical notes and short communications

By fostering the exchange of ideas and advancements, the Network and Information Security journal aims to significantly contribute to the understanding, development, and implementation of effective security measures in networked and information systems.

Publication Frequency

The journal is published online continuously in annual general issues. Articles included in special issues are published at one time, and the issue is then closed to additional articles.

Peer Review Type

Double anonymized

Reviewer identity is not made visible to author, author identity is not made visible to reviewer, reviewer and author identity is visible to (decision-making) editor.

Open Access Type

Full Gold Open Access

The final version of an article is freely and permanently accessible for everyone, immediately after publication.
No subscription fees are charged for any part of a journal that is fully gold open access.

Archiving Policy

We focus on making content discoverable and accessible through indexing services. Content is also archived to ensure long-term availability. The journal is indexed by the following services:

Google Scholar, the journal is available for harvesting via OAI-PMH.

To ensure the permanency of the journal, we utilize the Portico archiving system to create permanent archives for the purposes of preservation and restoration.

If the journal is not indexed by your preferred service, please let us know by emailing:  office@esdpub.com

 

 

Detailed information on policies and guidelines regarding our open access policy, copyrights and licenses, etc. can be viewed in our resource list.