Journal of Information Security and Applications

1.4k papers and 17.2k indexed citations i.

About

The 1.4k papers published in Journal of Information Security and Applications in the last decades have received a total of 17.2k indexed citations. Papers published in Journal of Information Security and Applications usually cover Artificial Intelligence (735 papers), Information Systems (523 papers) and Computer Networks and Communications (482 papers) specifically the topics of Cryptography and Data Security (323 papers), Chaos-based Image/Signal Encryption (305 papers) and Advanced Steganography and Watermarking Techniques (285 papers). The most active scholars publishing in Journal of Information Security and Applications are Sudeep Tanwar, Bruno Crispo, Richard Evans, Giovanni Russello, Mahmoud Ammar, Mohamed Amine Ferrag, Λέανδρος Μαγλαράς, Helge Janicke, Sotiris Moschoyiannis and Bibhudendra Acharya.

In The Last Decade

Fields of papers published in Journal of Information Security and Applications

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers published in Journal of Information Security and Applications. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers published in Journal of Information Security and Applications.

Countries where authors publish in Journal of Information Security and Applications

Since Specialization
Citations

This map shows the geographic impact of research published in Journal of Information Security and Applications. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers published in Journal of Information Security and Applications with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Journal of Information Security and Applications more than expected).

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar’s output or impact.

Explore journals with similar magnitude of impact

Rankless by CCL
2025