缩写名/全名 |
COMPUT SECUR
COMPUTERS & SECURITY |
||||||||||||||||||||
ISSN号 | 0167-4048 | ||||||||||||||||||||
研究方向 | 工程技术-计算机:信息系统 | ||||||||||||||||||||
影响因子 | 2015:1.64, 2016:2.849, 2017:2.65, 2018:3.062, 2019:3.579, | ||||||||||||||||||||
出版国家 | ENGLAND | ||||||||||||||||||||
出版周期 | Bimonthly | ||||||||||||||||||||
年文章数 | 205 | ||||||||||||||||||||
出版年份 | 1982 | ||||||||||||||||||||
是否OA | No | ||||||||||||||||||||
审稿周期(仅供参考) | 平均3.0个月 来源Elsevier官网:平均13.6周 |
||||||||||||||||||||
录用比例 | 容易 | ||||||||||||||||||||
投稿链接 | http://ees.elsevier.com/cose/ | ||||||||||||||||||||
投稿官网 | http://www.elsevier.com/wps/find/journaldescription.cws_home/405877/description#description | ||||||||||||||||||||
h-index | 77 | ||||||||||||||||||||
CiteScore |
|
||||||||||||||||||||
PubMed Central (PMC)链接 | http://www.ncbi.nlm.nih.gov/nlmcatalog?term=0167-4048%5BISSN%5D | ||||||||||||||||||||
中科院SCI期刊分区 ( 2018年新版本) |
|
||||||||||||||||||||
中科院SCI期刊分区 ( 2020年新版本) |
|
中国学者近期发表的论文 | |
1. | A Keyword-based Combination Approach for Detecting Phishing Webpages Author: Yan Ding, Nurbol Luktarhan, Keqin Li, Wushour Slamu Journal: COMPUTERS & SECURITY, 2019, Vol., , DOI:10.1016/j.cose.2019.03.018 DOI |
2. | Abnormal detection method of industrial control system based on behavior model Author: Yingxu Lai, Zenghui Liu, Jing Liu Journal: COMPUTERS & SECURITY, 2019, Vol., , DOI:10.1016/j.cose.2019.03.009 DOI |
3. | A Topology-Aware Access Control Model for Collaborative Cyber-Physical Spaces: Specification and Verification Author: Yan Cao, Zhiqiu Huang, Changbo Ke, Jian Xie, Jinyong Wang Journal: COMPUTERS & SECURITY, 2019, Vol., , DOI:10.1016/j.cose.2019.02.013 DOI |
4. | Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network Author: Mohamed Hammad, Kuanquan Wang Journal: COMPUTERS & SECURITY, 2018, Vol.81, 107-122, DOI:10.1016/j.cose.2018.11.003 DOI |
5. | DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton Author: Ye Wang, Qingbao Li, Ping Zhang, Zhifeng Chen, Guimin Zhang Journal: COMPUTERS & SECURITY, 2018, Vol.81, 94-106, DOI:10.1016/j.cose.2018.11.002 DOI |
6. | Securing peer-assisted indoor localization leveraging acoustic ranging Author: Shaoyong Du, Jingyu Hua, Sheng Zhong Journal: COMPUTERS & SECURITY, 2018, Vol.81, 58-77, DOI:10.1016/j.cose.2018.10.010 DOI |
7. | Privacy preserved wireless sensor location protocols based on mobile edge computing Author: Han Jiang, Hao Wang, Zhihua Zheng, Qiuliang Xu Journal: COMPUTERS & SECURITY, 2018, Vol., , DOI:10.1016/j.cose.2018.07.023 DOI |
8. | Securing android applications via edge assistant third-party library detection Author: Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu Journal: COMPUTERS & SECURITY, 2018, Vol.80, 257-272, DOI:10.1016/j.cose.2018.07.024 DOI |
9. | Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability Author: Yu-Guang Yang, Xue-Pei Guo, Gang Xu, Xiu-Bo Chen, Jian Li, Yi-Hua Zhou, Wei-Min Shi Journal: COMPUTERS & SECURITY, 2018, Vol.81, 15-24, DOI:10.1016/j.cose.2018.08.012 DOI |
10. | Find me a safe zone: A countermeasure for channel state information based attacks Author: Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Xiaojiang Chen, Zheng Wang Journal: COMPUTERS & SECURITY, 2018, Vol.80, 273-290, DOI:10.1016/j.cose.2018.09.017 DOI |
|
|