As a result of the significant disruption that is being caused by the COVID-19 pandemic we are very aware that many researchers will have difficulty in meeting the timelines associated with our peer review process during normal times. Please do let us know if you need additional time. Our systems will continue to remind you of the original timelines but we intend to be highly flexible at this time.
COVID-19 and impact on peer review
In this paper, Xing Fang et al develops a deep learning framework by utilizing the bi-directional recurrent neural networks with long short-term memory, dubbed BRNN-LSTM.
Emerging Technolgies for Cybersecurity
Edited by: Wojciech Mazurczyk, Maciej Korczyński, Krzysztof Szczypiorski and Artur Janicki
Advanced in Biometrics 2015
Edited by: Andreas Uhl, Christoph Busch, Christian Rathgeb and Arslan Brömme
Security Trends in Mobile Cloud Computing, Web and Social Networking
Edited by: Pethuru Raj Chelliah, B. B. Gupta and Shingo Yamaguchi
ARES 2015 / Cyber-Physical Systems
Edited by: Edgar Weippl
Open special issues
Security in Embedded Systems
Deadline for submission: 15 April 2020
Facing emerging challenges in multimedia forensics
Deadline for submission: 22 September 2020
Call for Special Issues
EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing. The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide overviews of the state-of-the-art in emerging domains.
Aims and scope
The overall goal of the EURASIP Journal on Information Security, sponsored by the European Association for Signal Processing (EURASIP), is to bring together researchers and practitioners dealing with the general field of information security, with a particular emphasis on the use of signal processing tools in adversarial environments. As such, it addresses all works whereby security is achieved through a combination of techniques from cryptography, computer security, machine learning and multimedia signal processing. Application domains lie, for example, in secure storage, retrieval and tracking of multimedia data, secure outsourcing of computations, forgery detection of multimedia data, or secure use of biometrics. The journal also welcomes survey papers that give the reader a gentle introduction to one of the topics covered as well as papers that report large-scale experimental evaluations of existing techniques. Pure cryptographic papers are outside the scope of the journal.
Learn more about the impact the EURASIP Journal on Information Security has worldwide
Annual Journal Metrics
113 days to first decision for reviewed manuscripts only
62 days to first decision for all manuscripts
180 days from submission to acceptance
42 days from acceptance to publication
Funding your APC
- ISSN: 2510-523X (electronic)