IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security
Pub Date : 2022-05-03DOI: 10.1001/jama.2022.4712Katherine L Tucker, Sam Mort, Ly-Mee Yu, Helen Campbell, Oliver Rivero-Arias, Hannah M Wilson, Julie Allen, Rebecca Band, Alison Chisholm, Carole Crawford, Greig Dougall, Lazarina Engonidou, Marloes Franssen, Marcus Green, Sheila Greenfield, Lisa Hinton, James Hodgkinson, Layla Lavallee, Paul Leeson, Christine McCourt, Lucy Mackillop, Jane Sandall, Mauro Santos, Lionel Tarassenko, Carmelo Velardo, Lucy Yardley, Lucy C Chappell, Richard J McManus