International Journal of Information and Computer Security

Call for papers
Editor in Chief: Prof. Dr. Eldon Y. Li
ISSN online: 1744-1773
ISSN print: 1744-1765
4 issues per year
Subscription price


Computer security has been a major concern since the 1950s. The ubiquity of the internet has engendered the prevalence of information sharing among networked users and organisations. This has rendered possible countless invasions of privacy/security worldwide. This risk has generated enormous concern about information and computer security among businesses, governments, legislators, academics, researchers, scientists and the public. IJICS is a double-blind refereed, authoritative reference addressing development of information/computer security in information technology, political science, informatics, sociology, engineering and science.


 Topics covered include

  • Assurance and integrity of service
  • Computer crime prevention/detection, computer forensics and security
  • Confidentiality protection, cryptography and data protection
  • Database and data security, denial of service protection
  • E-commerce security, e-surveillance
  • Fraud/hacker/terrorism detection/prevention, information warfare, national security
  • Information ethics
  • Information privacy issues, information systems/information security, sharing
  • Internet abuse, network intruder prevention, internet/network security
  • Malicious code/unauthorised access protection, transaction security, virus/worm controls
  • Risk management, safety-critical systems
  • Secure communications technology and computer systems
  • Security control measures, policy models and mechanisms
  • Software and hardware architectures
  • Wireless/mobile network security

More on this journal...

IJICS focuses on theory, design, implementation, analysis, and application of secure information and computer systems. Emphases will also be on the related social, political and economic issues as well as emerging issues of interest to legislators, professionals, researchers, academics, and technical community.


Professionals, researchers, legislators, academics, and technical community.


IJICS publishes original and review papers, technical reports, case studies, conference reports, management reports, book reviews, notes, and commentaries. Contribution may be by submission or invitation, and suggestions for special issues and publications are welcome.



Browse issues

Vol. 6
Vol. 5
Vol. 4
Vol. 3
Vol. 2
Vol. 1


 IJICS is indexed in:


 IJICS is listed in:


Editor in Chief

  • Li, Eldon Y., National Chengchi University, Taiwan

    Executive Editor

    • Yu, Fang, National Chengchi University, Taiwan

    Editorial Board Members

    • Agrawala, Ashok K., Department of Computer Science, USA
    • Amin, Massoud, CDTL Director and Professor of Electrical and Computer Engineering, USA
    • Atluri, Vijay, Rutgers University, USA
    • Bertino, Elisa, Purdue University, USA
    • Burmester, Michael, Florida State University, USA
    • Canas, Daniel, Wake Forest University, USA
    • Chapin, Steve J., Syracuse University, USA
    • Chen, Hsinchun, The University of Arizona, USA
    • Chen, Jinjun, University of Technology, Sydney, Australia
    • Davida, George, University of Wisconsin at Milwaukee, USA
    • Davis, James A., Iowa State University, USA
    • Denning, Dorothy, Naval Postgraduate School, USA
    • Doi, Norihisa, Faculty of Science and Engineering, Japan
    • Frincke, Deborah A., Pacific Northwest National Laboratory, USA
    • Ghosh, Anup K., USA
    • Hinke, Thomas H., NASA Ames Research Center, USA
    • Honavar, Vasant, Iowa State University, USA
    • Hwang, Jing-Jang, Chang Gung University, Taiwan
    • Imai, Hideki, Chuo University, Japan
    • Irwin, J. David, Electrical and Computer Engineering Department, USA
    • Jajodia, Sushil, Center for Secure Information Systems, USA
    • Khosla, Pradeep, Department of Electrical and Computer Engineering and Information Networking Institute (INI), USA
    • Killcrece, Georgia T., Carnegie Mellon University, USA
    • Kim, Kwangjo, Information and Communications University, Republic of Korea
    • Ladd, David, Microsoft Research, USA
    • Laih, Chi-Sung, National Cheng Kung University, Taiwan
    • Lam, Kwok-Yan, Tsinghua University, China
    • Lee, Der-Tsai, Academia Sinica, Taiwan
    • Lee, Ruby B., Department of Electrical Engineering, USA
    • Müller, Günter, Albert-Ludwig University of Freiburg, Germany
    • Martella, Giancarlo, University of Milano, Italy
    • Mclean, John D., Naval Research Laboratory, USA
    • Micali, Silvio, Massachusetts Institute of Technology, USA
    • Miller, Les, Iowa State University, USA
    • Ostrovsky, Rafail, University of California at Los Angeles, USA
    • Palmer, Charles C., IBM T.J. Watson Research Center, USA
    • Pieprzyk, Josef, Macquarie University, Australia
    • Porras, Phillip A., SRI International, USA
    • Preneel, Bart, Katholieke Universiteit Leuven, Belgium
    • Qing, Sihan, Chinese Academy of Sciences, China
    • Reeves, Douglas, North Carolina State University, USA
    • Rubin, Aviel, Johns Hopkins University, USA
    • Safavi-Naini, Rei, School of IT and CS, Australia
    • Samarati, Pierangela, Università degli Studi di Milano, Italy
    • Shieh, Shiuhpyng, National Chiao Tung University, Taiwan
    • Sibley, Edgar H., George Mason University, USA
    • Smart, Nigel, University of Bristol, UK
    • Spafford, Eugene, Purdue University, USA
    • Staddon, Jessica, 3333 Coyote Hill Road, USA
    • Thuraisingham, Bhavani, USA
    • Ting, T.C., Department of Computer Science and Engineering, USA
    • Tygar, Doug, University of California at Berkeley, USA
    • Varadharajan, Vijay, Director, Information and Networked System Security Research, Australia
    • Wallach, Dan S., P.O. Box 1892, USA
    • Warren, Mathew J., Deakin University, Australia
    • Wong, Johnny, Iowa State University, USA
    • Wool, Avishai, Tel Aviv University, Israel
    • Wright, Rebecca, Rutgers University, USA
    • Wu, Chwan-Hwa (John), Auburn University, USA
    • Yang, Shuang-Hua, Loughborough University, UK
    • Zeleznikow, John, Victoria University, Australia


    A few essentials for publishing in this journal


    • Submitted articles should not have been previously published or be currently under consideration for publication elsewhere.
    • Conference papers may only be submitted if the paper has been completely re-written (taken to mean more than 50%) and the author has cleared any necessary permissions with the copyright owner if it has been previously copyrighted.
    • All our articles are refereed through a double-blind process.
    • All authors must declare they have read and agreed to the content of the submitted article. A full statement of our Ethical Guidelines for Authors (PDF) is available.


    Submission process


    All articles for this journal must be submitted using our online submissions system.

    Read our Submitting articles page.



    Journal news

    • WPA2 wireless security cracked


      There are various ways to protect a wireless network. Some are generally considered to be more secure than others. Some, such as WEP (Wired Equivalent Privacy), were broken several years ago and are not recommended as a way to keep intruders away from private networks. Now, a new study published in the International Journal of [...]

      More details...


      13 - 14 May 2015
      Houston, USA
      more info on this event