IET Information Security

707 papers and 6.3k indexed citations
i
.

About

The 707 papers published in IET Information Security in the last decades have received a total of 6.3k indexed citations. Papers published in IET Information Security usually cover Artificial Intelligence (523 papers), Computer Networks and Communications (228 papers) and Information Systems (203 papers) specifically the topics of Cryptography and Data Security (224 papers), Cryptographic Implementations and Security (212 papers) and Chaos-based Image/Signal Encryption (170 papers). The most active scholars publishing in IET Information Security are Ashok Kumar Das, Suleiman Y. Yerima, Chun‐Ta Li, Ningrinla Marchang, Raja Datta, Mohammad Reza Aref, Igor Muttik, Rami Mustafa A. Mohammad, T.L. McCluskey and Fadi Thabtah.

In The Last Decade

IET Information Security

631 papers receiving 5.9k citations

Fields of papers published in IET Information Security

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers published in IET Information Security. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers published in IET Information Security.

Countries where authors publish in IET Information Security

Since Specialization
Citations

This map shows the geographic impact of research published in IET Information Security. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers published in IET Information Security with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites IET Information Security more than expected).

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar’s output or impact.

Explore journals with similar magnitude of impact

Rankless by CCL
2026