IET Information Security - Journal - Bridge of Knowledge

Search

IET Information Security

ISSN:

1751-8709

eISSN:

1751-8717

Disciplines
(Field of Science):

  • information and communication technology (Engineering and Technology)
  • biomedical engineering (Engineering and Technology)
  • security studies (Social studies)
  • management and quality studies (Social studies)
  • computer and information sciences (Natural sciences)

Ministry points: Help

Ministry points - current year
Year Points List
Year 2024 70 Ministry scored journals list 2024
Ministry points - previous years
Year Points List
2024 70 Ministry scored journals list 2024
2023 70 Ministry Scored Journals List
2022 70 Ministry Scored Journals List 2019-2022
2021 70 Ministry Scored Journals List 2019-2022
2020 70 Ministry Scored Journals List 2019-2022
2019 70 Ministry Scored Journals List 2019-2022
2018 25 A
2017 25 A
2016 25 A
2015 25 A
2014 20 A
2013 20 A
2012 25 A
2011 25 A
2010 13 A

Model:

Open Access

Points CiteScore:

Points CiteScore - current year
Year Points
Year 2023 3.8
Points CiteScore - previous years
Year Points
2023 3.8
2022 4
2021 3.3
2020 2.5
2019 2.2
2018 2.3
2017 2.8
2016 3.1
2015 2.5
2014 2.6
2013 2.1
2012 1.5
2011 1.3

Impact Factor:

Log in to see the Impact Factor.

Filters

total: 3

  • Category
  • Year
  • Options

clear Chosen catalog filters disabled

Catalog Journals

Year 2015
  • Approaching Secure Industrial Control Systems
    Publication

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Full text available to download

Year 2014
Year 2011
  • Approach to security assessment of critical infrastructures' information systems
    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

seen 611 times