By: D. Peraković
Journal of Cybersecurity
Oxford University Press
![](https://insights2techinfo.com/wp-content/uploads/2021/08/1.jpg)
IET Information Security
Institution of Engineering and Technology
![](https://insights2techinfo.com/wp-content/uploads/2021/08/iet.jpg)
ACM Transactions on Privacy and Security
Association for Computing Machinery (ACM)
![](https://insights2techinfo.com/wp-content/uploads/2021/08/acm_ps.jpg)
Journal of Cryptology
Springer New York
![](https://insights2techinfo.com/wp-content/uploads/2021/08/crypto.jpg)
Cryptologia
Routledge
![](https://insights2techinfo.com/wp-content/uploads/2021/08/crypto_tf.jpg)
Computer Law & Security Review
Elsevier LTD.
![](https://insights2techinfo.com/wp-content/uploads/2021/08/clsr.jpg)
ACM Transactions on Computer Systems
Association for Computing Machinery (ACM)
![](https://insights2techinfo.com/wp-content/uploads/2021/08/acmcover.jpg)
37801cookie-check10 Popular Journals in Cyber Security
Share this: