Skip to main content

Journals in Computing milieux general

Computer Law & Security Review

  • ISSN: 0267-3649
  • 5 Year impact factor: 3.4
  • Impact factor: 3.3
The International Journal of Technology Law and PracticeThe Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.
Computer Law & Security Review

Computers & Security

  • ISSN: 0167-4048
  • 5 Year impact factor: 5.2
  • Impact factor: 4.8
The International Source of Innovation for the Information Security and IT Audit ProfessionalComputers & Security is one of the most respected journals in IT security, being recognized worldwide as THE primary source of reference for IT security research and applications expertise.Computers & Security provides the IT security community with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia - helping the community build and operate fully secure systems and organisations.With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.Our cutting edge research will help you secure and maintain your systemsWe accept only the highest quality of papers ensuring that you receive the relevant and practical advice you needWe don't only highlight the threats, we give you the solutions
Computers & Security

Information and Software Technology

  • ISSN: 0950-5849
  • 5 Year impact factor: 4
  • Impact factor: 3.8
Visit the journal's proposal guidelines to submit a proposal for a special issue (original contributions on a topic within the scope of the journal) or a special section with extended papers from a conference of workshop within the scope of the journal.Information and Software Technology is the international archival journal focusing on research and experience that contributes to the improvement of software development practices. The journal's scope includes methods and techniques to better engineer software and manage its development. Articles submitted for review should have a clear component of software engineering or address ways to improve the engineering and management of software development. Areas covered by the journal include: • Software management, quality and metrics, • Software processes, • Software architecture, modelling, specification, design and programming • Functional and non-functional software requirements • Software testing and verification & validation • Empirical studies of all aspects of engineering and managing software development Short Communications is a new section dedicated to short papers addressing new ideas, controversial opinions, "Negative" results and much more. Read the Guide for authors for more information.The journal encourages and welcomes submissions of systematic literature studies (reviews and maps) within the scope of the journal. Information and Software Technology is the premiere outlet for systematic literature studies in software engineering. Guidelines for conducting systematic reviews are provided here.Benefits to authors We also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our Support Center.
Information and Software Technology

Journal of Information Security and Applications

  • ISSN: 2214-2126
  • 5 Year impact factor: 4.2
  • Impact factor: 3.8
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA.JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications.Current JISA topicsAuthentication and access controlAnonymity and privacyCryptographic protectionDigital forensicsHuman factors in securityMultimedia securityNetwork and mobile securitySecurity management and policiesHardware and physical security
Journal of Information Security and Applications

Journal of Systems Architecture

  • ISSN: 1383-7621
  • 5 Year impact factor: 3.6
  • Impact factor: 3.7
Embedded Software DesignThe Journal of Systems Architecture: Embedded Software Design (JSA) is a journal covering all design and architectural aspects related to embedded systems and software. It ranges from the microarchitecture level via the system software level up to the application-specific architecture level. Aspects such as real-time systems, operating systems, programming languages, communications (limited to analysis and the software stack), mobile systems, parallel and distributed architectures as well as additional subjects in the computer and system architecture area will fall within the scope of this journal. Technology will not be a main focus, but its use and relevance to particular designs will be. Case studies are welcome but must contribute more than just a design for a particular piece of software.Design automation of such systems including methodologies, techniques and tools for their design as well as novel designs of software components fall within the scope of this journal. Novel applications that use embedded systems are also central in this journal. While JSA does not focus on hardware design, hardware/software co-design techniques with an emphasis on software are also relevant here.Reproducibility Badge Initiative and Software PublicationReproducibility Badge Initiative (RBI) is a collaboration with Code Ocean (CO), a cloud based computational reproducibility platform that helps the community by enabling sharing of code and data as a resource for non-commercial use. CO verifies the submitted code (and data) and certifies its reproducibility. Code submission will be verified by the Code Ocean team for computational reproducibility by making sure it runs, delivers results and it is self-contained. For more information please visit this help article . Note that an accepted paper will be published independently of the CO application outcome. However, if the paper receives the Reproducibility badge, it will be given additional exposure by having an attached R Badge, and by being citable at the CO website with a DOI.Software ImpactsWe invite you to convert your open source software into an additional journal publication in Software Impacts, a multi-disciplinary open access journal. Software Impacts provides a scholarly reference to software that has been used to address a research challenge. The journal disseminates impactful and re-usable scientific software through Original Software Publications (OSP) which describe the application of the software to research and the published outputs.How to submit an article to Software Impacts, https://www.journals.elsevier.com/software-impacts/For more information contact us at: [email protected] to authors We also provide many author benefits, such as free PDFs, a liberal copyright policy, special discounts on Elsevier publications and much more. Please click here for more information on our author services.Please see our Guide for Authors for information on article submission. If you require any further information or help, please visit our Support Center
Journal of Systems Architecture

Simulation Modelling Practice and Theory

  • ISSN: 1569-190X
  • 5 Year impact factor: 3.5
  • Impact factor: 3.5
The journal Simulation Modelling Practice and Theory provides a forum for original, high-quality papers dealing with any aspect of systems simulation and modelling.The journal aims at being a reference and a powerful tool to all those professionally active and/or interested in the methods and applications of simulation. Submitted papers will be peer reviewed and must significantly contribute to modelling and simulation in general or use modelling and simulation in application areas.Paper submission is solicited on:• theoretical aspects of modelling and simulation including formal modelling, model-checking, random number generators, sensitivity analysis, variance reduction techniques, experimental design, meta-modelling, methods and algorithms for validation and verification, selection and comparison procedures etc.;• methodology and application of modelling and simulation in any area, including computer systems, networks, real-time and embedded systems, mobile and intelligent agents, manufacturing and transportation systems, management, engineering, biomedical engineering, blockchains, artificial intelligence (AI), internet of things (IoT), education, transaction handling, etc.;• simulation languages and environments including those, specific to distributed computing, cloud, fog and edge computing, high performance computers or computer networks, etc.;• distributed and real-time simulation, simulation interoperability;• tools for high performance computing simulation, including dedicated architectures and parallel computing.Papers covering applications should be presented in such a way that the separate steps in the process, such as model development, computer implementation of the derived model, mathematical and scalability problems encountered and validation/verification with real data become transparent to all readers.Theory may play an important role in a paper, but it should be presented in the context of its applicability to the work being described. For application-oriented readers it is essential that theoretical papers should cover the following aspects: why the theory is relevant and how it can be applied, what is the novelty of the approach and what are the benefits and objectives of a new theory, method or algorithm; what experience has been obtained in applying the approach and what innovations did result.(Variations from these prototypes, such as comprehensive surveys of active research areas, critical reviews of existing work, and book reviews, will be considered provided they make a clear contribution to the field.)Special issues on specific topics will be published from time to time; proposals for such issues are invited.
Simulation Modelling Practice and Theory