Information and Computer Security(TRANSFERRED)

Information and Computer Security is an international Open Access journal that publishes original research articles and review articles related to all areas of information and computer security. This journal covers education, policies, standards, simulations and control of internet security.


 

Online Submissions

Registration and login are required to submit items online and to check the status of current submissions.

Already have a Username/Password for Information and Computer Security?
GO TO LOGIN

Need a Username/Password?
GO TO REGISTRATION

Submission Preparation Checklist

As part of the submission process, authors are required to check off their submission's compliance with all of the following items, and submissions may be returned to authors that do not adhere to these guidelines.

  1. The submission has not been previously published, nor is it before another journal for consideration (or an explanation has been provided in Comments to the Editor).
  2. The submission file is in OpenOffice, Microsoft Word, RTF, or WordPerfect document file format.
  3. Where available, URLs for the references have been provided.
  4. The text is single-spaced; uses a 12-point font; employs italics, rather than underlining (except with URL addresses); and all illustrations, figures, and tables are placed within the text at the appropriate points, rather than at the end.
  5. The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines, which is found in About the Journal.
  6. If submitting to a peer-reviewed section of the journal, the instructions in Ensuring a Blind Review have been followed.
 

Privacy Statement

The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.

Article Processing Charges (APC)

Information and Computer Security is an Open Access Journal under EnPress Publisher. All articles published in Information and Computer Security are accessible electronically from the journal website without commencing any kind of payment. In order to ensure contents are freely available and maintain publishing quality, Article Process Charges (APC) is applicable to all authors who wish to submit their articles to the journal to cover the cost incurred in processing the manuscripts. Such cost will cover the peer-review, copyediting, typesetting, publishing, content depositing and archiving processes. Those charges are applicable only to authors who have their manuscript successfully accepted after peer-review.

Journal TitleAPC
Information and Computer Security$800

We encourage authors to publish their papers with us and don’t wish the cost of article processing fees to be a barrier especially to authors from the low and lower middle income countries/regions. A range of discounts or waivers are offered to authors who are unable to pay our publication processing fees. Authors can write in to apply for a waiver and requests will be considered on a case-by-case basis.

APC Payment

Payments for APC of this journal can be made through our online PayPal payment gateway. Enter the article no. into the below textbox and select "Pay Now" to proceed with payment.

Article No.*

*Article No. is mandatory for payment and it can be found on the acceptance letter issued by the Editorial Office. Payment without indicating Article No. will result in processing problem and delay in article processing. Please note that payments will be processed in USD. You can make payment through Masters, Visa or UnionPay card.


Vol 1, No 1

Table of Contents

Open Access
Articles
Article ID: 407
PDF
by Qinghong Liang, Shangying Cao, Zhengan Qi
2018 , 1(1);    310 Views
Abstract A computer virus is a computer program or instruction set that can interfere with the normal operation of the computer and cause the computer hardware and software to malfunction and destroy the computer data. With the computer in various fields of social life widely used, computer virus attack and prevention technology is also constantly expanding, to prevent computer viruses are also more and more attention. This paper starts from the basic theory of script virus and the key technology of scripting virus, and realizes a simple script virus, and deeply analyzes the mechanism and principle of script virus. This paper summarizes the development history and development trend of computer virus, briefly introduces the basic knowledge of VBScript, Windows Script Host (WSH) and registry required to realize script virus. This paper focuses on the working principle of the script virus and the main techniques used in each module. Taking the source code of the script virus as an example, it analyzes the function of design idea, infection module, damage module and tag module, and implements the script virus Recursive algorithm for searching disk mechanisms and infection mechanisms.
show more
Open Access
Articles
Article ID: 408
PDF
by Jinliang Shen, Shiming Gong, Wencong Bao
2018 , 1(1);    953 Views
Abstract From the beginning of the new century to the rapid development of global information technology today, with the popularity of the Internet and the rapid construction of information technology, more and more people involved in the use of the Internet. Especially in the past two years, online surfing, e-commerce, online chat, e-government, Internet banking, online shopping transactions, online games, this series of network activities, has become a hot application of today's society. With the increasing reliance on the network and information technology in all aspects of society, the network has become an indispensable part of work and life for most people. The rapid development of the network brings closer the distance between real life and virtual world, changed the way people work, study and live. It can be sure that now the human life becomes more relaxed because of network. However, the network has brought us great convenience, but also brought some difficulties. Due to the design defects of the Internet itself and its complexity, openness and expanding of the software scale, the application is more and more complex, making the hidden danger of the network increased dramatically. Therefore, the security of the network has become one of the important factors hindering the process of information technology. Today, for many users, they know that they are facing a certain network threat. But from where, what will happen, are not very clear for many people. Generally speaking, ordinary network users mainly face Internet security issues. Computer viruses, cyber scams, data loss, botnets, phishing, privacy leaks, are a few example of network security threats. The recent impact of large events, such as: Panda burning incense virus, Trojan industry chain exposure, once macro virus, Trojan horse site-linked malware, makes the network security issues become the focus of attention, even to worldwide audience.
show more
Open Access
Articles
Article ID: 409
PDF
by Qinghua Jiang, Lilin Lin, Yanhong He
2018 , 1(1);    234 Views
Abstract With the rapid development of computer technology and the popularization of the network, human civilization is undergoing profound changes. The network has become an important resource for the political, economic, military and cultural aspects of the country and has become a symbol of national soft power. With the extensive use of computer networks and the increase in data transmission between networks, network security issues are becoming more prominent. Network security is related to national security, social stability, economic development and cultural construction and other fields, has become a hot topic of global concern. If a country cannot guarantee the security of network information in terms of collection, storage, transmission and authentication, it is impossible to obtain the efficiency and efficiency of information technology. The social and economic life is difficult to be carried out in a healthy and orderly manner. When the status of China's network information security is not optimistic. People should correctly deal with the negative impact caused by the process of information technology, take positive measures to protect the security of China's network information.
show more
Open Access
Articles
Article ID: 410
PDF
by Xinyue Yang, Shujun Zhou, Guanghui Ren, Yaling Liu
2018 , 1(1);    822 Views
Abstract In recent years, the Internet as a symbol of the computer network protocols, standards and application technology development is extremely rapid. But the Internet is like a sharp double-edged sword, it is for the convenience of people at the same time, but also for computer viruses and computer crime to provide the soil, for systems, network protocols and databases, whether it is its own design flaws, or due to human factors caused by a variety of security vulnerabilities, may be some of the other attempts to use hackers and attack, so the establishment of an effective network security system is even more urgent. To ensure network security, reliable, you must be familiar with the general process of hacker network attacks. The only way to do before the hacker attack the necessary precautions is to ensure that the network is safe and reliable operation. This article comprehensively analyzes the steps, methods and common attack tools of network attack, and tells the concrete precautionary measures from several aspects, so that readers have a comprehensive network of knowledge, in the treatment of network threats are well prepared.
show more
More Articles>>

Announcements

 

Journal News: Announcement of Transferring Journal

To whom it may concern:

 

Due to operational and developmental considerations, EnPress Publisher LLC is delighted to announce that the journal entitled Information and Computer Security  is now published by PiscoMed Publishing Pte Ltd. in Singapore. All operations related to the journal will be solely handled by PiscoMed Publishing Pte Ltd. and its partners.

 

 

Posted: 2018-12-21
 

Journal News: Publisher’s Note

We are pleased at the constructive and collaborative manner in which we were able to work with the Editorial Board Member. We appreciate those of scholars who help and surpport us running the Journal. We are reaching primary goal of launching journal, we hope our scholars will continue to pay attention and participate enthusiastically, and submit some high quanlity papers to our Journal. Thank you!

Posted: 2018-09-14
 
More Announcements...