Information and Computer Security

Information and Computer Security

ISSNs: 2056-4961, 0968-5227

Emerald Group Publishing Ltd., United Kingdom

Scopus rating (2021): CiteScore 3.6 SJR 0.437 SNIP 0.945

Journal

Journal Metrics

Research Output

  1. 2016
  2. Published

    Enhancing collaborative intrusion detection networks using intrusion sensitivity in detecting pollution attacks

    Li, W. & Meng, W., 2016, In: Information and Computer Security. 24, 3, p. 265-276

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 36
    Check@CityULib
  3. Published

    Evaluating the effect of multi-touch behaviours on Android unlock patterns

    Meng, W., 2016, In: Information and Computer Security. 24, 3, p. 277-287

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 15
    Check@CityULib
  4. 2014
  5. Published

    The Effect of Adaptive Mechanism on Behavioural Biometric Based Mobile Phone Authentication

    MENG, Y., WONG, S. D. & KWOK, L. F., 2014, In: Information Management and Computer Security. 22, 2, p. 155 - 166

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Check@CityULib
  6. 2010
  7. Brand, knowledge, and false sense of security

    Hui, W., 2010, In: Information Management and Computer Security. 18, 3, p. 162-172

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 12
    Check@CityULib
  8. 2001
  9. Published

    Integrating security design into the software development process for e-commerce systems

    Chan, M. T. & Kwok, L. F., 2001, In: Information Management and Computer Security. 9, 2-3, p. 112-122

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)62_Review of books or of software (or similar publications/items)peer-review

    Scopus citations: 14
    Check@CityULib
  10. 1999
  11. Published

    Information security management and modelling

    Kwok, L. & Longley, D., 1999, In: Information Management and Computer Security. 7, 1, p. 30-39

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 31
    Check@CityULib
  12. 1997
  13. Published

    Hypertext information security model for organizations

    Kwok, L., 1 Oct 1997, In: Information Management & Computer Security. 5, 4, p. 138-148

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 6
    Check@CityULib
  14. 1995
  15. Published

    Legal control of computer crime in Hong Kong

    Lee, M. K. O., May 1995, In: Information Management & Computer Security. 3, 2, p. 13-19

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)62_Review of books or of software (or similar publications/items)peer-review

    Scopus citations: 2
    Check@CityULib