International Journal of Information Security Engineering is a peer-reviewed hybrid open-access journal launched in 2015 have earned a reputation for editorial excellence and is creating an impact on the research community. Journal focuses on providing practical usable information in the field of network security. The papers included in this journal are original research articles and editorial reviews of exceptional quality.


International Journal of Information Security Engineering

Journal Abbreviation


Issues Per Year

2 issues


STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.




STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.

Starting Year






Publication Format

Hybrid, and Open Access

Type of Publication

Peer-reviewed Journal (Refereed Journal)



STM Journals, An imprint of Consortium e-Learning Network Pvt. Ltd.
A-118, 1st Floor, Sector-63, Noida, U.P. India, Pin - 201301


Google Scholar, DRJI,Citefactor

Refreed Journal

Focus and Scope

  • Information security and risk management: Enterprises, information security risk management, digital economy, information assets, information security threats, preventive measures, business data processing, risk management, security of data information security management, risk assessment, and analysis, information technology infrastructure library.
  • Ethical hacking: Hacking, White hat Hackers, Ethical Hackers, Phishingcyber security, ethical hackers, white hat hackers, hacking techniques, ethical hacking concepts ethical aspects, security of data Computer hacking, Computer crime, Tools, Password, Phishing.
  • Operating system security: Operating system, Kenwood-diven, testing and evaluating, secure operating system testing, secure operating system evaluation,keyword-driven mechanism, computer system, information technology System testing, Operating systems, Information security.
  • Windows security: Windows, security, configuration Safety, Personal communication networks, Information security, Operating systems, Computer networks, Computerized monitoring, Remote monitoring, Protection, Information technology, Computer worms.
  • Object-oriented design: Computer industry, Computer-aided engineering, Expert systems, Object-oriented programming, Object-oriented languages, Software reusability, Very-large-scale integration object-oriented design, distributed platform, Wirfs-Brock CRCs, Fusion, object-oriented analysis, formal English, object-oriented system description, formal specification, object-oriented development, MOOD object-oriented system development process, ACUMEN, configurable platform, object-oriented control systems, enterprise modeling, information system design.
  • Security architecture: Control flow, security, embedded system, random permutation service, oriented security architecture design, large-scale information system, security products, security technologies, SOA, security service layer, security components, functional combination, process control, distributed system.
  • Computer forensics: Data mining, dynamic forensics, computer forensics, computer crime, invasion hunting, patch safety-bug, dynamic computer forensics,multi-agent system, Web system, perfect network safety system, secure computer forensics, computer security, digital evidence security, collection phase, transmission phase, storage stage.
  • Reverse engineering: Reverse Engineering, Law and Ethics, Digital Millennium Copyright Act (DMCA), Software Contracts, professional software development, decision making, corporate policy, SQL statements, database reverse engineering, dynamic analysis techniques, dynamic SQL query analysis, software reverse engineering,aspect-based tracing, SQL trace analysis.
  • Web application penetration testing: Neural networks, tools, penetration testing, web applications, online Web sites, Web page variations, inbuilt dynamic modules, user interactions, Inferential Metamorphic Testing, Inferential Metamorphic Relations, Mutational Metamorphic, SQL Injection, Vulnerability, Web security, testing inaccuracy, blind penetration tests, SQLIV penetration test tools, False Positives reduction,inference-based penetration tests, logic operators, mutation operators, iterative IMT process, background testing, context deduction.
  • Compliance and operational security: Real-time business process validation, compliance checking, process mining, operational support, IT security, IT service desk automation, online operational support,distributed-security sensitive electronic business processes, online process mining techniques, sensitive data handling, security level, real-time compliance checking, heterogeneous entities, process log aggregation, process log analysis, process log validation, validation authority, process monitoring, software agent dispatch, central log, validation tree, process executions, average call length reduction.
  • Threats and vulnerabilities: Vulnerability-threat prediction, topic analysis, vulnerabilities exploitation, topic categories, non-cybersecurity-related tweets, social media data, contextual information, profile information, Twitter, social media contents, Common Vulnerability Exposures, vulnerability entries, dynamic vulnerability-threat assessment model, publicly available resources, future cyber threats, intelligence gathering, commercial cybersecurity vendors, national vulnerability database, cybersecurity news, Computer Emergency Response Team alerts, intelligence sources,security-related patching, effective patch management, vulnerable target, malicious actors, available software vulnerabilities.
  • Access control and identity management: Access control, Identity management systems, Authorization, Context modeling, Information security, collaboration, Permission, Computer security, Conference management, Information management, role-based access control model, activity-based access control model, university unified identity, access management system, R-ABAC, digraph, context information.
  • Cryptography: Cryptography, personalization, IoT, cognitive sciences, cognitive computing, context recognition, cognitive cryptography, IoT environment, personalized cryptography, data streams.


Submission of Paper:

Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration. Papers are accepted for editorial consideration through email : [email protected]

Plagiarism: All the articles will be check through Plagiarism Software before publication.  

Subject: Computer Science