Journals in Computer science
Journals in Computer science
The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.
Cognitive Systems Research
Cognitive Systems Research is dedicated to the study of human-level cognition. As such, it welcomes papers which advance the understanding, design and applications of cognitive and intelligent systems, both natural and artificial.The journal brings together a broad community studying cognition in its many facets in vivo and in silico, across the developmental spectrum, focusing on individual capacities or on entire architectures. It aims to foster debate and integrate ideas, concepts, constructs, theories, models and techniques from across different disciplines and different perspectives on human-level cognition. The scope of interest includes the study of cognitive capacities and architectures - both brain-inspired and non-brain-inspired - and the application of cognitive systems to real-world problems as far as it offers insights relevant for the understanding of cognition.Cognitive Systems Research therefore welcomes mature and cutting-edge research approaching cognition from a systems-oriented perspective, both theoretical and empirically-informed... in the form of original manuscripts, short communications, opinion articles, systematic reviews, and topical survey articles from the fields of Cognitive Science (including Philosophy of Cognitive Science), Artificial Intelligence/Compute... Science, Cognitive Robotics, Developmental Science, Psychology, and Neuroscience and Neuromorphic Engineering. Empirical studies will be considered if they are supplemented by theoretical analyses and contributions to theory development and/or computational modelling studies. Note that the journal does not publish clinical and medical papers. We also do not publish pure machine learning papers, e.g. studies proposing variants of classifiers or pure algorithmic improvements that bear no connection to cognitive systems research in the sense above.Additionally, Cognitive Systems Research plays a special role in fostering and promoting the 'BICA Challenge' to create a real-life computational equivalent of the human mind by devoting two special issues to BICA AI (Brain-Inspired Cognitive Architectures for Artificial Intelligence) related topics each year.- ISSN: 1389-0417

Displays
Displays is a peer reviewed international journal accepting technical, original research papers and tutorial papers dealing with display technologies and applications. The journal welcomes submissions in a wide range of display-related topics, including display technologies, materials, components, methods and systems, display-human interaction, processing and analysis of visual signals, and visual perception. The journal aims to provide a platform for the publication of top quality display-related research works with both academic and industrial appeal.Our dedicated editorial team will try their best to ensure a rapid reviewing process. The journal covers topics include, but not limited to, the following fields:Display-human Interaction• Visual signal processing and computer vision (CV) • Display-human/user interface design and analysis • Image/video quality assessment (IQA/VQA) and quality of experience (QoE) • Visual performance measurement and assessment • Visual perception and its cortical representation • Human factors and ergonomics for displaysDisplay Technology• Emissive/non-emissiv... displays • Flexible displays and E-papers • Materials/components and drive-electronics for displays • 3D displays and virtual/augmented/mi... reality (VR/AR/MR) • Auditory and tactile displays • Computational displays- ISSN: 0141-9382

Journal of Information Security and Applications
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.The international editorial board of JISA and its guest editors are committed to the highest scientific standards by implementing a strict peer-review policy for submitted articles. It will also regularly invite the best papers from renowned information security venues for publication in JISA.JISA issues are published quarterly with a strong emphasis for details and technical contributions, covering a wide range of advanced and latest information security topics, including new and emerging research directions and scientific vision while keeping the readers informed of the state-of-the-art security techniques, technologies and applications.Current JISA topicsAuthentication and access controlAnonymity and privacyCryptographic protectionDigital forensicsHuman factors in securityMultimedia securityNetwork and mobile securitySecurity management and policiesHardware and physical security- ISSN: 2214-2126

Computer Law & Security Review
The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.- ISSN: 0267-3649

Computers & Security
The International Source of Innovation for the Information Security and IT Audit ProfessionalComputer... & Security is one of the most respected journals in IT security, being recognized worldwide as THE primary source of reference for IT security research and applications expertise.Computers & Security provides the IT security community with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia - helping the community build and operate fully secure systems and organisations.With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.Our cutting edge research will help you secure and maintain your systemsWe accept only the highest quality of papers ensuring that you receive the relevant and practical advice you needWe don't only highlight the threats, we give you the solutionsCryptology: The journal's editorial scope has explicitly excluded cryptology since 2006. Therefore, submissions with some aspect of cryptology (including blockchains, watermarking, and steganography) as a principal component will not be considered for review.AI and ML: As of early 2024, we have instituted a moratorium on consideration of submissions that feature AI or ML as significant components. Thus, submissions about applying an AI/ML technique to system security and privacy topics will not be considered. Also, items directed to the security of AI/ML systems themselves (such as LLM and federated learning) are out of scope of the journal and should be submitted to a venue primarily about AI/ML.- ISSN: 0167-4048

Computerized Medical Imaging and Graphics
Computerized Medical Imaging and Graphics publishes pioneering research addressing complex computational and visualization challenges in medical imaging, including machine learning, computer vision, foundation models, generative AI and simulation, medical robotics, agentic AI, virtual and augmented reality, and quantum computing—fields that are transforming medical imaging and biomedical data science. The journal emphasizes algorithmic advances, novel methodologies and clinically oriented applications that drive disease screening, early detection, precision diagnosis, therapeutic intervention, prevention, monitoring, and telemedicine. Serving as a leading interdisciplinary platform for computing researchers, imaging scientists, engineers, and physicians, CMIG highlights AI-enabled imaging solutions that bridge methodological innovation with clinical translation.We welcome contributions on AI-driven and emerging computational methods for image acquisition, reconstruction, visualization, analysis, and interpretation, with particular focus on deep learning, generative AI, and agentic AI that enhance diagnostic accuracy, improve therapeutic efficacy, and enable precision medicine and minimally invasive interventions. Topics of interest include novel imaging and visualization techniques; AI and machine learning; augmented and virtual reality for surgery and therapy; computer-aided diagnosis; robotic and image-guided intervention; biomedical data fusion and visualization; autonomous agents; mobile and tele-imaging; and integration of imaging with genomic, transcriptomic, proteomic, video, and audio data.The journal covers a wide spectrum of modalities—MRI, CT, ultrasound, nuclear medicine, X-ray, microwave, endoscopy, digital pathology, optical and multiphoton microscopy, spatial omics, video, and sensory imaging—along with the convergence of imaging and non-imaging biomedical datasets to accelerate digital health and precision medicine.- ISSN: 0895-6111

International Journal of Critical Infrastructure Protection
The International Journal of Critical Infrastructure Protection (IJCIP) was launched in 2008, with the primary aim of publishing scholarly papers of the highest quality in all areas of critical infrastructure protection. Of particular interest are articles that weave science, technology, law and policy to craft sophisticated yet practical solutions for securing assets in the various critical infrastructure sectors. These critical infrastructure sectors include: information technology, telecommunications, energy, banking and finance, transportation systems, chemicals, critical manufacturing, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, nuclear reactors, materials and waste, postal and shipping, and government facilities. Protecting and ensuring the continuity of operation of critical infrastructure assets are vital to national security, public health and safety, economic vitality, and societal wellbeing.The scope of the journal includes, but is not limited to:1. Analysis of security challenges that are unique or common to the various infrastructure sectors. 2. Identification of core security principles and techniques that can be applied to critical infrastructure protection. 3. Elucidation of the dependencies and interdependencies existing between infrastructure sectors and techniques for mitigating the devastating effects of cascading failures. 4. Creation of sophisticated, yet practical, solutions, for critical infrastructure protection that involve mathematical, scientific and engineering techniques, economic and social science methods, and/or legal and public policy constructs.A unique aspect of the journal is the publication of opinion pieces from leading international scholars and high-ranking government officials that tackle controversial issues related to critical infrastructure protection that are of global significance.The International Journal of Critical Infrastructure Protection is the official journal of International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection.- ISSN: 1874-5482

Smart Health
This journal focuses on research topics pertaining to devices, sensing, computing and communication technologies, software/hardware modeling and system architectures towards Personalized, Pervasive, Participatory, Predictive, Preventive, Programmable and Perpetual (P7) Healthcare. This will be an interdisciplinary journal which would publish high-quality papers from researchers of various disciplines including medicine, computer science and engineering and bio and electrical engineering. Papers covering all aspects of P7 Healthcare including innovative technology, clinical studies of efficacy of existing technology, and analytical studies are in this journal.P7 Healthcare Models:E-healthcareM... TelemedicineCybermed... HealthcareP7 Platforms and Technologies:Home Health PlatformsCell-phone based monitoring systemsRemote/ Non-invasive BiomonitoringWireles... MedicineWearable health systemBody area networks (BANs)/Body Sensor Networks (BSNs)Nano medicineSmart medical DevicesP7 MethodsNon-invasive physiological monitoringReliable BiosensingHCI , Intuitive Interfaces for Children and the ElderlyPrivacy/Secur... Control ProtocolsWireless communicationP7 IT/Software-Hardware... Methods for ensuring safety, security of medical devicesInteroperable SecurityModel Based EngineeringMetrics, Performance Analysis methods and toolsPowering, Energy Management/Scavengin... SustainabilityModeli... techniques: cyber-physical, hybrid modelsSystem Software, Middelware, OS, NetworkingMedical device control system design, verification of control algorithmsP7 Patient Care Outcomes:Health Data PrivacyImproving Access and QualityCost-effectiv... Medical ErrorsP7 Applications:Assiste... LivingDisaster PreparednessEntertai... Games for Improving HealthDiabetes CareObesity ManagementDrug Use PreventionSports and Leisure- ISSN: 2352-6483

Computer Law & Security Review
The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.- ISSN: 2212-473X

Data & Knowledge Engineering
Database Systems and Knowledgebase Systems share many common principles. Data & Knowledge Engineering (DKE) stimulates the exchange of ideas and interaction between these two related fields of interest. DKE reaches a world-wide audience of researchers, designers, managers and users. The major aim of the journal is to identify, investigate and analyze the underlying principles in the design and effective use of these systems. DKE achieves this aim by publishing original research results, technical advances and news items concerning data engineering, knowledge engineering, and the interface of these two fields.DKE covers the following topics:Representatio... and Manipulation of Data & Knowledge: Conceptual data models. Knowledge representation techniques. Data/knowledge manipulation languages and techniques.Architect... of database, expert, or knowledge-based systems: New architectures for database / knowledge base / expert systems, design and implementation techniques, languages and user interfaces, distributed architectures.Constr... of data/knowledge bases: Data / knowledge base design methodologies and tools, data/knowledge acquisition methods, integrity/security/m... issues.Applications, case studies, and management issues: Data administration issues, knowledge engineering practice, office and engineering applications.Tools for specifying and developing Data and Knowledge Bases using tools based on Linguistics or Human Machine Interface principles.Communica... aspects involved in implementing, designing and using KBSs in Cyberspace.Plus... conference reports, calendar of events, book reviews etc.- ISSN: 0169-023X
