IET Information Security

695 papers and 6.2k indexed citations i.

About

The 695 papers published in IET Information Security in the last decades have received a total of 6.2k indexed citations. Papers published in IET Information Security usually cover Artificial Intelligence (515 papers), Computer Networks and Communications (225 papers) and Information Systems (201 papers) specifically the topics of Cryptography and Data Security (221 papers), Cryptographic Implementations and Security (207 papers) and Chaos-based Image/Signal Encryption (166 papers). The most active scholars publishing in IET Information Security are Ashok Kumar Das, Suleiman Y. Yerima, Chun‐Ta Li, Raja Datta, Ningrinla Marchang, Mohammad Reza Aref, T.L. McCluskey, Fadi Thabtah, Rami Mustafa A. Mohammad and F. Liu.

In The Last Decade

Fields of papers published in IET Information Security

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers published in IET Information Security. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers published in IET Information Security.

Countries where authors publish in IET Information Security

Since Specialization
Citations

This map shows the geographic impact of research published in IET Information Security. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers published in IET Information Security with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites IET Information Security more than expected).

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar’s output or impact.

Explore journals with similar magnitude of impact

Rankless by CCL
2025