| 缩写名/全名 | 
                                 
                                    IET INFORM SECUR
                                     
                            IET Information Security  | 
                        ||||||||||||||||||||||||
| ISSN号 | 1751-8709 | ||||||||||||||||||||||||
| 研究方向 | 工程技术-计算机:理论方法 | ||||||||||||||||||||||||
| 影响因子 | 2015:1.013, 2016:1.037, 2017:0.89, 2018:0.949, 2019:1.068, | ||||||||||||||||||||||||
| 出版国家 | ENGLAND | ||||||||||||||||||||||||
| 出版周期 | Quarterly | ||||||||||||||||||||||||
| 年文章数 | 75 | ||||||||||||||||||||||||
| 出版年份 | 0 | ||||||||||||||||||||||||
| 是否OA | No | ||||||||||||||||||||||||
| 审稿周期(仅供参考) | 平均6.0个月 | 
                        ||||||||||||||||||||||||
| 录用比例 | 容易 | ||||||||||||||||||||||||
| 投稿链接 | http://mc.manuscriptcentral.com/iet-ifs | ||||||||||||||||||||||||
| 投稿官网 | http://www.ietdl.org/IET-IFS | ||||||||||||||||||||||||
| h-index | 26 | ||||||||||||||||||||||||
| CiteScore | 
                                
  | 
                        ||||||||||||||||||||||||
| PubMed Central (PMC)链接 | http://www.ncbi.nlm.nih.gov/nlmcatalog?term=1751-8709%5BISSN%5D | ||||||||||||||||||||||||
| 中科院SCI期刊分区 ( 2018年新版本)  | 
                            
                                
  | 
                        ||||||||||||||||||||||||
| 中科院SCI期刊分区 ( 2020年新版本)  | 
                            
                                
  | 
                        
| 中国学者近期发表的论文 | |
| 1. | Improved certificate-based signature scheme without random oracles Author: luyangnsd Journal: IET Information Security, 2016.  | 
| 2. | Robustness of text-based completely automated public turing test to tell computers and humans apart Author: hchgao Journal: IET Information Security, 2016.  | 
| 3. | Supervised approach for detecting average over popular items attack in collaborative recommender systems Author: zhouqiang128 Journal: IET Information Security, 2016.  | 
| 4. | Building a new secure variant of Rainbow signature scheme Author: csshtang Journal: IET Information Security, 2016.  | 
| 5. | Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers Author: haoyl14 Journal: IET Information Security, 2016.  | 
  | 
  |