AIM
Due to rapid growth and development of inter-disciplinary graduate degrees in universities and research centers around the globe, Journal of Information, Security, and Systems Management (JISSM), as a publication of the Islamic Azad University Electronic Campus, aims to serve as a platform to enhance the scientific and technical level of the researchers and practitioners in related fields.
In this regard, the editorial board of the Journal welcomes contributions from respectful scholars, theorists, researchers, and graduate students from related areas and topics listed below.
OBJECTIVES
The objectives of IJISSM are:
- To Promote the research and practice related to information technology, management, and security;
- To establish an effective channel of communication between national and international scientists, scholars, and academic centers;
- To serve as a platform for integrative analysis among policy-makers, researchers, and practitioners on the broad spectrum of internal and global issues.
READERSHIP
The Journal is a forum to help students and scholars in various fields of information technology, industrial management, computer engineering and inter-disciplinary fields such as Internet law, cyber law, and information security.
TOPICS
Topics of interest include but not limited to:
Security
- cyber security
- reverse engineering
- malware detection
- mobile security
- network security
- OS security
- hack
- network security protocols
- intrusion detection
- data mining for security applications
- machine learning security solutions
- machine learning cyber security
- machine learning cyber security cryptography
- machine learning security risks
- big data security and privacy
- data security sharing
- data infrastructure big security
- security theories big data
- big data era information security
- distributed systems security threats
- distributed systems security and privacy
- distributed systems security trust management
- distributed systems security protocols
- distributed systems security mechanisms
- distributed systems security vulnerabilities analysis
- distributed systems security methodology
Network
- ad hoc network
- network wireless
- network wireless sensor
- cryptography
- cryptography security
- cryptography security algorithms
- cryptography techniques
- cryptography theory
- internet of things security
- cloud computing
- cloud security
- cloud security challenges risks
- cloud services
- fog computing
- fog computing architecture
- fog computing security
- fog computing security issues
- fog computing internet of things
- fog computing architecture
- fog computing cisco
System management
- information system management
- structuring information system management
- information system management model
- system management theory
- system management approach
- system management module
- system management method
- system management functions