Journal of Information Security and Technologies (JIST)
Journal Metrics
ISSN: 3066-1285
DOI: 10.17303
Impact Factor: 4.2
Peer Review: Double Blind
Fastrack Publication: Yes
Digital Preservation: Portico
Archive
Vol-01 | Issue-1-2025

Searching for and Blocking Destructive Content in Images

In the modern world, it isincredible to imagine that once home. Now it's worth going online and all the news, any books and courses are in your pocket. Unlimited amount of information resources from text to video.

pdf

Vulnerability Management Best Practices: Developing Strategies for Tracking and Remediating Vulnerabilities within Defined SLAs

Vulnerability management has developed into an essential method for minimizing risks and ensure the security of information technology systems in our world which is becoming more and more technologically oriented

pdf

Design of a Multifactor Authentication System for Automated Teller Machines

In this research, the authors appreciate the advantages of card less ATM transactions and proposed that mainly uses the already existing components of the ATM except

pdf

Ransomware: Are We Safe on the Web?

drive-by freeware apps and malicious email attachments. One of the most common and widely discussed malware is‘Ransomware’ that isthe core theme of this paper. Finally, those hackers ask the owner of that particular

pdf

An Energy Efficient Approach for Improving Network Performance of Wireless Sensor Network Assisted Internet of Things Applications

Interesting technologies due to the diverse applications such as health care monitoring, smart phones, military, disaster management, and other surveillance systems

pdf

Journal of Information Security and Technologies

Journal of Information Security and Technologies (JIST) is an international open access, scholarly peer-reviewed journal publishing high quality articles in all areas of information security and technologies, especially current research, new concepts, novel methods and approaches for early detection and reporting new methods on basic and advanced aspects of Journal of Information Security and Technologies.

Journal of Information Security and Technologies (JIST) aims at rapid publication of high quality results in Information Security and Technologies while maintaining rigorous peer-review process. All accepted papers will be appearing online immediately.

Editorial Board

Qiong Chen
Qiong Chen

Navigation College Jimei University China...

Popov Dmitry Ivanovich
Popov Dmitry Ivanovich

Full professor Department of Radio Engineerin...

Know More

Recent Article

Searching for and Blocking Destructive Content in Images

In the modern world, it isincredible to imagine that once home. Now it's worth going online and all the news, any books and courses are in your pocket. Unlimited amount of information resources from text to video.

Elena Revyakina
Vulnerability Management Best Practices: Developing Strategies for Tracking and Remediating Vulnerabilities within Defined SLAs

Vulnerability management has developed into an essential method for minimizing risks and ensure the security of information technology systems in our world which is becoming more and more technologically oriented

Santosh Kumar Kande
Design of a Multifactor Authentication System for Automated Teller Machines

In this research, the authors appreciate the advantages of card less ATM transactions and proposed that mainly uses the already existing components of the ATM except

Charles S Lubobya
Ransomware: Are We Safe on the Web?

drive-by freeware apps and malicious email attachments. One of the most common and widely discussed malware is‘Ransomware’ that isthe core theme of this paper. Finally, those hackers ask the owner of that particular

Md Sajjad Hosain
An Energy Efficient Approach for Improving Network Performance of Wireless Sensor Network Assisted Internet of Things Applications

Interesting technologies due to the diverse applications such as health care monitoring, smart phones, military, disaster management, and other surveillance systems.

Mohsen NASRI
Understanding A Hacker’s Mind from A Criminal Perspective

If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy

S Krishnan