Search results
Results from the WOW.Com Content Network
Submission of preprints is accepted by all open access journals. Over the last decade, they have been joined by most subscription journals, however publisher policies are often vague or ill-defined. [1] In general, most publishers that permit preprints require that:
The IEEE Transactions on Dependable and Secure Computing is a bimonthly peer-reviewed scientific journal covering all aspects of dependability and security. It is published by the IEEE Computer Society and was established in 2004. The current editor-in-chief is Jaideep Vaidya (Rutgers University).
International Journal of Creative Computing; International Journal of Data Warehousing and Mining; International Journal of e-Collaboration; International Journal of Foundations of Computer Science; International Journal of High Performance Computing Applications; International Journal of Image and Graphics; International Journal of Information ...
Cluster Computing (journal) Cognitive Systems Research; Combinatorica; Communications of the ACM; Complex Systems (journal) Computational and Mathematical Organization Theory; Computational Mechanics (journal) Computer Aided Surgery (journal) The Computer Journal; Computer Law & Security Review; Computer Networks (journal) Computer Science ...
The Computer Law & Security Review is a journal accessible to a wide range of professional legal and IT practitioners, businesses, academics, researchers, libraries and organisations in both the public and private sectors, the Computer Law and Security Review regularly covers: CLSR Briefing with special emphasis on UK/US developments
The Journal of Cybersecurity is an open access peer reviewed academic journal of cybersecurity. It is published by Oxford University Press. [1] It was first issued in 2015. [1] Its editors in chief are Tyler Moore and David Pym. [2] The journal is a member of the Committee on Publication Ethics (COPE). [1]
FIPS 140-2 defines four levels of security, simply named "Level 1" to "Level 4". It does not specify in detail what level of security is required by any particular application. FIPS 140-2 Level 1 the lowest, imposes very limited requirements; loosely, all components must be "production-grade" and various egregious kinds of insecurity must be ...
It does not include delayed open access journals, hybrid open access journals, or related collections or indexing services. True open-access journals can be split into two categories: diamond or platinum open-access journals , which charge no additional publication, open access or article processing fees