Our IAEME Publication journals are indexed in various indexing search engines given below
- Scope Database (www.sdbindex.com)
- Google Scholar (https://scholar.google.com)
- ResearchGate (https://www.researchgate.net/)
- Academia (https://www.academia.edu/)
- SSRN (https://www.ssrn.com/)
- Indian Citation Index (ICI) (http://www.indiancitationindex.com/)
- Advanced Science Index (https://journal-index.org/)
- ResearchBib (https://www.researchbib.com/)
Aim and Scope
The international journal of information security (IJIS) is a peer reviewed scholarly publication by IAEME Publication. Anyone interested in information security from an academic standpoint, including engineers, mathematicians, and computer scientists, is the journal's target audience.
The topics covered include network security, Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures, content protection, software protection, and tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility; and foundations: privacy. System security topics covered include intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, and security evaluation.
Dr. Preeti Patil - Head and Associate Professor, Department of Information Technology, D.Y. Patil College of Engineering, Pune, India
Mr. Gaurav Jaisinghani - Manager, Security Engineering, Bolt.Inc, Los Angeles, California
Mr. Venkata Naga Satya Surendra Chimakurthi - Solutions Architect, Cognizant Technology Solutions, USA
Dr. T.S.Poornappriya - Data Scientist, Tech Mahindra, Bangalore Campus, Karnataka, India
Dr. Rasha A. Almajed - Assistant Professor, Computer and Information Technology, American University in The Emirates, Dubai
Dr. Sandeep Chaware - Professor, IT Department Rajarshi Shahu College of Engineering, Pune, India
Dr. Michael G.Albino - Program Chairperson, College of Communication and Information Technology, President Ramon Magsaysay State University, Castillejos, Zambales, Philippines
Dr. S.M.Chaware - Professor, Computer Engineering, ISO, IQAC and NBA Coordinator, Marathwada Mitramandal’s College of Engineering, Pune, India
Dr. Aaisha Makkar - Research Associate, International Project on Cyber Security, Punjab, India
Dr. C. Navaneethan - Associate Professor, Department of Software and Systems Engineering, School of Information Technology & Engineering, Vellore Institute of Technology (VIT), Vellore, India
Dr. Sukumar Senthilkumar - Division of Computer Science and Engineering, Chon Buk National University, South Korea
Dr. Diwakar Yagyasen - Professor and Head, Department of Computer Science and Engineering, BBD National Institute of Technology and Management, Lucknow, India
Dr. Satinderjeet Singh - Associate Manager, The Children’s Place, 500 Plaza Drive, Secaucus, New Jersey, USA – 07094
Mr. Sai Madhur Potturu - Robotics Process Automation (RPA) Solution Developer, Zoetis Inc, New Jersey, United States
Paper title (14 Bold)- Capital Letter
First Author1, Second Author2 (13 Bold- Times New Roman)
1(Department, College/ University Name, Address, Country Name, Email) (12)
2(Department, College/ University Name, Address, Country Name, Email) (12)
ABSTRACT (12 Bold)
The abstract should summarize the content of the paper. Try to keep the abstract below 350 words. Do not make references nor display equations in the abstract. The journal will be printed from the same-sized copy prepared by you. Your manuscript should be printed on A4 paper (21.0 cm x 29.7 cm). It is imperative that the margins and style described below be adhered to carefully. This will enable us to keep uniformity in the final printed copies of the Journal. Please keep in mind that the manuscript you prepare will be photographed and printed as it is received. Readability of copy is of paramount importance.(12)
Keywords (12 Bold) : About five key words in alphabetical order, separated by comma (12)
I. INTRODUCTION (12 BOLD)
The introduction of the paper should explain the nature of the problem, previous work, purpose, and the contribution of the paper. The contents of each section may be provided to understand easily about the paper. (12)
II. HEADINGS (12 BOLD)
The headings and subheadings, starting with "1. Introduction", appear in upper and lower case letters and should be set in bold and aligned flush left. All headings from the Introduction to Acknowledgements are numbered sequentially using 1, 2, 3, etc. Subheadings are numbered 1.1, 1.2, etc. If a subsection must be further divided, the numbers 1.1.1, 1.1.2, etc.
The font size for heading is 12 points bold face and subsections with 12 points and not bold. Do not underline any of the headings, or add dashes, colons, etc. (12)
III. INDENTATIONS AND EQUATIONS(12 BOLD)
The first paragraph under each heading or subheading should be flush left, and subsequent paragraphs should have a five-space indentation. A colon is inserted before an equation is presented, but there is no punctuation following the equation. All equations are numbered and referred to in the text solely by a number enclosed in a round bracket (i.e., (3) reads as "equation 3"). Ensure that any miscellaneous numbering system you use in your paper cannot be confused with a reference  or an equation (3) designation. (12)
IV. FIGURES AND TABLES(12 BOLD)
To ensure a high-quality product, diagrams and lettering MUST be either computerdrafted or drawn using India ink.
Figure captions appear below the figure, are flush left, and are in lower case letters.When referring to a figure in the body of the text, the abbreviation "Fig." is used. Figures should be numbered in the order they appear in the text.
Table captions appear centered above the table in upper and lower case letters. When referring to a table in the text, no abbreviation is used and "Table" is capitalized. (12). Figures and tables should be included in the running text itself
V. CONCLUSION (12 BOLD)
A conclusion section must be included and should indicate clearly the advantages, limitations, and possible applications of the paper. Although a conclusion may review the main points of the paper, do not replicate the abstract as the conclusion. A conclusion might elaborate on the importance of the work or suggest applications and extentions. (12)
VI. ACKNOWLEDGEMENTS(12 Bold)
An acknowledgement section may be presented after the conclusion, if desired.( 12)
REFERENCES (12 BOLD)
This heading is not assigned a number.
A reference list MUST be included using the following information as a guide. Only cited text references are included. Each reference is referred to in the text by a number enclosed in a square bracket (i.e., ). References must be numbered and ordered according to where they are first mentioned in the paper, NOT alphabetically.
 M Ozaki, Y. Adachi, Y. Iwahori, and N. Ishii, Application of fuzzy theory to writer recognition of Chinese characters, International Journal of Modelling and Simulation, 18(2), 1998, 112-116. (12)
 R.E. Moore, Interval analysis (Englewood Cliffs, NJ: Prentice-Hall, 1966). (12) Note that the title of the book is in lower case letters and italicized. There is no comma following the title. Place of publication and publisher are given.
Chapters in Books:
 P.O. Bishop, Neurophysiology of binocular vision, in J.Houseman (Ed.), Handbook of physiology, 4 (New York: Springer-Verlag, 1970) 342-366. (12) Note that the place of publication, publisher, and year of publication are enclosed in brackets. Editor of book is listed before book title.
 D.S. Chan, Theory and implementation of multidimensional discrete systems for signal processing, doctoral diss., Massachusetts Institute of Technology, Cambridge, MA, 1978. (12)
 W.J. Book, Modelling design and control of flexible manipulator arms: A tutorial review, Proc. 29th IEEE Conf. on Decision and Control, San Francisco, CA, 1990, 500-506 (12)
IAEME Publication charges an Article Processing Charge (APC) once an article is accepted for publication. These charges cover the costs of turning a manuscript into a finished article, as well as the costs of hosting, distributing and promoting an article.
Article Processing Charges explained
We are committed to making the costs of publishing as clear as possible and so the charges for each journal are clearly displayed on each journal`s homepage.
When a manuscript is submitted, it passes through the many different departments at IAEME Publications to ensure the quality checks, peer review, production and promotion of articles is carried out in a timely manner and to a high standard:
✔ The Editorial Screening team, who perform initial technical and ethical checks
✔ The Editorial team, who help the journal`s Academic Editors manage the review process
✔ The Production team, who convert the manuscript to a professionally typeset article and well-structured file format
✔ The Proofing team, who coordinate the proofing process through IAEME Publications
✔ The Editorial Quality Assurance team, who perform a final check to ensure that the manuscript and its review process adhere to the journal`s guidelines and policies
✔ Our Marketing and Communication teams, who ensure your article receives the attention it deserves.
✔ The Technology team, who build and maintain our systems, and develop new systems
The work these teams do contribute to the requirement of an APC and is why the actual amount payable varies depending on the journal in which you wish to publish your article.
IAEME Publication does not request Article Submission Charges, also called Submission Fees. These are due at the time of submission of the manuscript. Nor does IAEME charge per page or for color figures or for any other items for which other publishers are known to charge.
Sources for Article Processing Charges (APC)
Authors of an article are responsible for arranging the payment of APC. Still, that typically does not mean that authors end up paying for the publication of the article. The cost of APC is very often assumed either by the organization funding the research published in the article, or by an Open Access Publishing Fund, or by the institution at which the author is employed.
Fair Dealing - Authors and Publisher
When an author submits a manuscript for review at one of IAEME`s journals, the submitted manuscript should not have been previously published in any form and must not be currently under consideration for publication elsewhere. The manuscript should also not be submitted to any other journal during the review process at IAEME Publication. In case the review process at IAEME takes much longer than stated and the author wishes to end the review process at IAEME, he/she should get in contact with the Editorial Assistant of the journal at IAEME and come to an agreement suitable for both sides after looking at the stage of the manuscript in the review process.
With the APC specified above, the author is given an indication what the APC will be. IAEME is charging Publication Fees (APC) but not Submission Fees. This is to the benefit to authors because payments are only due once the author knows the manuscript is accepted. IAEME with editors and reviewers puts much effort in dealing with the manuscript and expects the authors to stick to the common plan of publishing the paper which is linked to payments of APC as given above at the end of the review process. The author is not legally bound at this time, but it would be seen as a strong breach of academic conduct to back off from the publication process. Once the manuscript is accepted for publication, IAEME will issue an invoice in the Paper Submission and Manuscript Tracking System. This is IAEME `s legal offer and will state the regular APC of the journal. The Corresponding Author is expected to arrange payments of the amount stated at this time. In severe cases IAEME `s Complaints Procedure can be followed and the result of this should be binding to the author.
Once an article has been accepted for publication, any Article Processing Charges on the article become due. The submitting author accepts responsibility for the Article Processing Charges, and will not issue refunds of any kind except those payments made by mistake or in excess of the amount required.
- Cryptographic Algorithms
- Identification and Authentication
- Foundations of Cryptology
- Access Control and Trust Management
- Operating Systems Security
- Security Protocols
- Database Security
- Auditing and Intrusion Detection
- Network Security
- E-Business Security
- Formal Methods in Information Security
- Privacy and Anonymity
- Security in New Computational Environments
- Secure Software Development / Software Security
- Cryptographic Hardware and Embedded Systems
- Information Hiding