Journals in Social sciences and humanities
Journals in Social sciences and humanities
Cognitive Systems Research
Cognitive Systems Research is dedicated to the study of human-level cognition. As such, it welcomes papers which advance the understanding, design and applications of cognitive and intelligent systems, both natural and artificial.The journal brings together a broad community studying cognition in its many facets in vivo and in silico, across the developmental spectrum, focusing on individual capacities or on entire architectures. It aims to foster debate and integrate ideas, concepts, constructs, theories, models and techniques from across different disciplines and different perspectives on human-level cognition. The scope of interest includes the study of cognitive capacities and architectures - both brain-inspired and non-brain-inspired - and the application of cognitive systems to real-world problems as far as it offers insights relevant for the understanding of cognition.Cognitive Systems Research therefore welcomes mature and cutting-edge research approaching cognition from a systems-oriented perspective, both theoretical and empirically-informed... in the form of original manuscripts, short communications, opinion articles, systematic reviews, and topical survey articles from the fields of Cognitive Science (including Philosophy of Cognitive Science), Artificial Intelligence/Compute... Science, Cognitive Robotics, Developmental Science, Psychology, and Neuroscience and Neuromorphic Engineering. Empirical studies will be considered if they are supplemented by theoretical analyses and contributions to theory development and/or computational modelling studies. Note that the journal does not publish clinical and medical papers. We also do not publish pure machine learning papers, e.g. studies proposing variants of classifiers or pure algorithmic improvements that bear no connection to cognitive systems research in the sense above.Additionally, Cognitive Systems Research plays a special role in fostering and promoting the 'BICA Challenge' to create a real-life computational equivalent of the human mind by devoting two special issues to BICA AI (Brain-Inspired Cognitive Architectures for Artificial Intelligence) related topics each year.- ISSN: 1389-0417

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2817

Computer Law & Security Review
The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.- ISSN: 0267-3649

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 1742-2876

Forensic Science International: Digital Investigation
FSI Digital Investigation covers a broad array of subjects related to crime and security throughout the computerized world. The primary pillar of this publication is digital evidence and multimedia, with the core qualities of provenance, integrity and authenticity. This publication promotes advances in investigating cybercrimes, cyberattacks and traditional crimes involving digital evidence, using scientific practices in digital investigations, and reducing the use of technology for criminal purposes.This widely referenced publication promotes innovations and advances in utilizing digital evidence and multimedia for legal purposes, including criminal justice, incident response, cybercrime analysis, cyber-risk management, civil and regulatory matters, and privacy protection. Relevant research areas include forensic science, computer science, data science, artificial intelligence, and smart technology.This journal is used by investigative agencies and forensic laboratories, computer security teams, practitioners, researchers, developers, and lawyers from industry, law enforcement, government, academia, and the military to share their knowledge and experiences, including current challenges and lessons learned in the following areas:Research and development: Novel research and development in forensic science, computer science, data science, and artificial intelligence applied to digital evidence and multimedia. New methods to deal with challenges in digital investigations, including applied research into analysing digital evidence and multimedia, exploiting specific technologies, and into preparing for and responding to computer security incidents.Cyber-crim... investigation: develop new methods of online investigation and analysis of financially motivated cyber-crime such as banking Trojans, phishing, ransomware and other forms of cyber-fraud. In addition, researching future criminal activity involving peer-to-peer payments and crypto currencies.Hardware Forensics: develop new methods of extracting and analyzing evidence from electronic hardware. This includes analyzing IoT devices, embedded systems, industrial control systems, automobiles, and other systems requiring hardware component access to extract data (e.g., chip-off, debugging interfaces like JTAG, fault injection).Cyber-ris... management: Improved ways of using digital evidence to address security breaches involving information systems, methods to find zero day attacks and to perform cyber threat intelligence. The techniques and findings of digital investigations are essential in drawing post-incident conclusions, which are vital feedback components of the security policy development process, and managing risk appetite.Case Notes: Brief investigative case studies with practical examples of how digital evidence is being used in digital investigations, forensic analysis, and incident response. Case Notes can also describe current challenges that practitioners are facing in cybercrime and computer security, highlighting areas that require further research, development or legislation. The format for Case Notes is simple and short: case background, any technical or legal challenges, the digital evidence and multimedia involved, processes and/or tools used, and outcomes (e.g., solutions, barriers, need for R&D). Please check the following example for preferred Case Note format: https://www.scienced... practices: Novel approaches to strengthening the scientific foundation and rigor of digital investigations, and to increasing the reliability of and confidence in processes, analysis methods, results, and conclusions involving digital evidence and multimedia.Effective practices: Studies that assess new practices in digital investigations and propose effective approaches to handling and processing digital evidence.Survey papers: Discussion of current methods and future needs relevant to digital investigations, including analysing digital evidence and multimedia from computers, smart technology, mobile phones, memory, malware, network traffic, as well as systems that support enterprises, telecommunications, and satellites. In addition, advanced approaches to analysing digital evidence and multimedia, including novel applications of artificial intelligence and data analytics.Applicatio... analysis: Novel approaches to analysing applications on mobile devices and computers from a digital forensic perspective. Analysis may include configuration and log data, network telemetry and cloud storage, live memory artifacts, and indications of compromised and abused applications. Proposed methods should go beyond a single version of an application and be generalized to multiple versions of an application, or a general category of applications (e.g. social networking), on multiple platforms (Android, iOS). In addition, strong work in this area will extend the functionality of an existing open source tool, or provide a new open source tool. Also of interest are approaches to performing validation and quality assurance of forensic software that must be updated frequently to support new applications. Such papers should be structured around investigative questions that are commonly encountered in digital investigations, concentrating on the users and their activities rather than only on technical elements.Tool reviews: Evaluation and comparison of specialized software and hardware used to preserve, survey, examine, analyse or present digital evidence and multimedia, deepening our understanding of specific tools, and highlight any needed enhancements.Future challenges: Analysis of new technologies, vulnerabilities and exploits which may create opportunities for criminality and/or computer security incidents, but which require further work in order to determine how their use can be investigated and the evidential opportunities they may create.Registered reports: Studies that assess methods critically, and evaluating the reliability, statistical power, and reproducibility of results. Such reports can include tests and experiments with negative results, not just positive.Evidence accessibility: exploring safe, fair, and feasible methods of acquiring digital evidence from protected sources such as DRM, encrypted traffic, encrypted storage, and locked proprietary devices, while taking individual privacy and ethical aspects into consideration.Author Note: General methods for detecting forgery in digital photographs or videos are not within scope of Forensic Science International: Digital Investigation, and will be rejected without review. To be within scope of this Journal, any novel forgery detection method must be evaluated using datasets that are representative of actual digital investigations. In addition, improvements over existing methods must be clearly demonstrated. It is recommended that authors provide a working implementation of their proposed method to enable others to test it using their own datasets for comparison with existing methods.Forensic Science International: Digital Investigation was previously published as Digital Investigation (now discontinued).The Forensic Science International journals offer comprehensive and pioneering coverage within the forensic sciences and beyond, disseminating ground-breaking discoveries, highly specialised research, and foundational science across the family of publications. The FSI portfolio comprises of: • Forensic Science International • Forensic Science International: Animals and Environments • Forensic Science International: Digital Investigation • Forensic Science International: Genetics • Forensic Science International: Genetics Supplement Series • Forensic Science International: Mind and Law • Forensic Science International: Reports • Forensic Science International: Synergy- ISSN: 2666-2825

Computer Law & Security Review
The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. It has been published six times a year since 1985 under its founding Editor, Emeritus Professor Steve Saxby, who retired in 2018 after handing editorship over to Professor Sophie Stalla-Bourdillon. It is the leading journal of its kind in Europe and provides a robust peer reviewed medium and policy forum for dissemination of knowledge and discussion, supported by powerful Editorial and Professional Boards.CLSR is accessible to a wide range of academics, researchers, research institutes, companies, libraries and governmental and non-governmental organisations in both the public and private sectors as well as professionals in the legal, IT and related business sectors in more than 100 countries. It is available on ScienceDirect, the world's foremost provider of electronic scientific information to more than 16 million subscribers.CLSR authors come from leading academics, international specialists, legal professionals and early career researchers from many of the most renowned research centres and universities in the world. Contributors are also located in the major international law firms, specializing in technology law, who provide essential comment and analysis built upon widespread experience of applying IT law in practice. CLSR further welcomes policy analysis from legal specialists, the judiciary, professional and business organisations operating in IT and from those with regulatory responsibilities for information and communications technology from both the public and private sectors as it regularly contributes to consultations undertaken by the EU, Council of Europe and other bodies. Papers that reflect the outcomes of funded research e.g. from Research Councils or EU projects are welcomed. Submissions are welcomed from any part of the world. CLSR is looking for papers within the subject area that display good quality legal analysis, new lines of legal thought or policy development that go beyond mere description of Law or policy, however accurate that may be.CLSR publishes refereed academic and practitioner papers on a wide range of legal topics such as Internet law, telecoms regulation, intellectual property, cyber-crime, surveillance and security, e-commerce, outsourcing, data protection, ePrivacy, EU and public sector ICT policy, and many others. In addition it provides a regular update on European Union developments, and national news from more than 20 jurisdictions in both Europe and the Pacific Rim.All papers are then peer reviewed by relevant experts and feedback is given whether or not a paper is accepted or returned for further work. Submissions will normally be between 6,000-15,000 words although papers of a higher word length may also be submitted subject to negotiation with the Editor. The Editor's policy is to try and accommodate contributions of all sizes above the minimum threshold where length is dictated by the needs of the subject matter.Opinion pieces concerning policy, legislation or case law of a minimum of 2000 words and upwards will also be considered but these will appear as comment and not as feature articles.Please note that CLSR strongly encourages PhD students, who have not yet obtained their degree, not to submit papers unless accompanied by confirmation that the supervisor has seen the manuscript and is recommending it for publication. If the supervisor's approval can be provided, asserting that the draft manuscript has been reworked and developed with the journal's aims and expectations in mind, then it will be accepted for review.- ISSN: 2212-473X

Ecological Complexity
An International Journal on Biocomplexity in the Environment and Theoretical EcologyEcological Complexity is an international journal devoted to publishing high-quality, peer-reviewed articles on the complex nature of ecological systems, observed and theoretical and special issues on related and emerging topics. In addition to ecological questions, the journal welcomes papers that ask ecological questions by linking natural and social processes at various spatio-temporal scales.Ecological Complexity will publish research into the following areas: • Ecosystems and the biosphere as complex adaptive systems • Self-organization of spatially extended ecosystems • Emergent properties and structures of complex ecosystems • Ecological pattern formation in space and time • The role of biophysical constraints and evolutionary attractors on species assemblages • Ecological scaling (scale invariance, scale covariance and dynamics across scales), allometry, and hierarchy theory • Ecological topology and networks • Studies towards an ecology of complex systems • Approaches to complex systems for the study of dynamic human-environment interactions • Using knowledge of nonlinear phenomena to better guide policy development for adaptation strategies and mitigation to environmental change • New tools and methods for studying ecological complexityThe papers that should appear in this journal are characterized by: • Biocomplexity related to the environment and vice versa • Inter disciplinarity (e.g. biology, ecology, environmental science, mathematics, modelling) • Integration of natural and social processes (esp. over time)- ISSN: 1476-945X

Journal of Stored Products Research
The Journal of Stored Products Research provides an international medium for the publication of both reviews and original results from laboratory and field research on all aspects of the preservation and safety of stored products along the supply chain starting from production to the consumer. The scope covers both durable commodities, and fresh fruits, vegetables, and freshly manufactured foodstuffs. Durable commodities are characterized by having relatively low moisture content and include raw and semi-processed foods such as grains, dried fruits, and animal feed, and other stored products such as timber, rubber, resins, clothing, and museum artefacts that are generally suitable for long-term storage. Fresh fruits, vegetables, and freshly manufactured foodstuffs (eg. bakery, sausages), are characterized by having high moisture contents but are stored over short to medium-term storage.Manuscripts are welcomed on: the biology, ecology, physiology, behaviour, taxonomy, and genetics of vertebrates (eg. rodents and birds) and invertebrate pests (eg. insects, mites) and microbial spoilage agents (eg. fungi, mold, yeast, and bacteria)environment... factors influencing the life cycles of the above-listed storage pests and spoilage agentsthe physical, chemical, and biological control of pests and spoilage agents, including the use of biologically producing compounds as preservatives with broad-spectrum antimicrobial activitiessubmission of manuscripts containing research on plant materials/botanicals are encouraged only if significant applied aspects are undertaken demonstrating their detailed chemical composition and long-term efficacy in the laboratory, supported by field application and the use of suitable controls: both negative/blank and positive (i.e., a compound of known activity)development of biochemical or behavioural resistance in pests to control measures and their managementstorage biotechnology, integrated pest management, and decision support systemsthe effects of physical, chemical, and environmental control procedures on the physical and chemical nature, besides quality parameters of the stored commoditiesthe assessment, prevention, and control of physical losses and preservation of quality of commodities during storage, and waste managementregulatory... technological, and socio-economic subjects relevant to stored productsNovel approaches in postharvest food engineering and manufacturing technologies, (eg. AI tools, chemical sensors, gas detectors) in processing, packaging, and design and modifications of storage structuresThe Journal of Stored Products Research reflects the worldwide interest in finding researched-based solutions for problems arising from the process of storage directly affecting the quality of stored products and their relevance to food security and safety, commodity protection, and their market access and trade.- ISSN: 0022-474X

Ecological Modelling
International Journal on Ecological Modelling and Systems EcologyEcological Modelling publishes new mathematical models and systems analysis for describing ecological processes, and novel applications of models for environmental management. We welcome research on process-based models embedded in theory with explicit causative agents and innovative applications of existing models. And because applications can help refine models and propose new directions for research, the journal publishes both to help foster reproducibility and utility.Human activity and well-being are dependent on and integrated with the functioning of ecosystems and the services they provide. We aim to understand these basic ecosystem functions using mathematical and conceptual modelling, systems analysis, thermodynamics, computer simulations, and ecological theory, and look to a wide spectrum of applications ranging from basic ecology to human ecology to socio-ecological systems. The journal welcomes original research articles, review articles, viewpoint articles and short communications.The journal also supports the activities of the International Society of Ecological Modelling (ISEM).- ISSN: 0304-3800
