News

Category

Journal impact factor (JIF) is one of the most well-known and widely used metrics to evaluate the influence and impact of academic journals. Developed by Eugene Garfield and introduced by the Institute for Scientific Information (ISI), now part of Clarivate Analytics, JIF has become a cornerstone of scholarly assessment. Created in 1969 to help librarians...
Read More
International Journal of Power Electronics and Drive Systems (IJPEDS) is an official publication of the Institute of Advanced Engineering and Science (IAES). The journal welcomes manuscript submissions from researchers and experts in the field of power electronics, electric drives, and energy systems from around the world. The scope of the journal covers all issues in...
Read More
Source normalized impact per paper (SNIP) is a sophisticated metric designed to measure the contextual citation impact of academic journals. Developed by the Centre for Science and Technology Studies (CWTS) at Leiden University, SNIP provides a different perspective on journal impact by accounting for differences in citation practices across different scientific fields. The following is...
Read More
SCImago Journal Rank (SJR) is a leading metric used to assess the impact and influence of scientific journals. Developed by the SCImago research group, the SJR indicator is based on the Scopus database and offers a sophisticated alternative to other journal metrics such as Impact Factor and CiteScore. The following is an in-depth explanation of...
Read More
In academia, evaluating the impact and quality of scholarly journals is very important for researchers, institutions, and publishers. Created by indexing companies or related platforms, these lists are often created using objective calculations to assign a score to each journal. These scores are primarily focused on a journal’s average citation metric. These calculated metrics are...
Read More
The use of AI in academic journals is becoming more prevalent, and it is proving difficult to detect. Some authors are using AI to generate text, figures, images, or data for their papers, but they fail to disclose the use of AI. Journals are taking different approaches to address this issue. For example, the JAMA...
Read More
attack is a supply chain attack method that allows hackers to hijack popular abandoned libraries in Java and Android applications, potentially injecting malware into them. This attack exploits the vulnerabilities of these libraries, which are still in use despite being abandoned. The attack targets dependency repositories, such as google() and mavenCentral. Key points about the...
Read More
Software Supply Chain Security (SSCS) is the practice of implementing security measures and best practices throughout the entire software development and distribution process to mitigate risks and vulnerabilities. It encompasses various components, activities, and practices involved in the creation and deployment of software, including proprietary and third-party code, development and delivery infrastructure, APIs, and more....
Read More
Two-factor authentication (2FA) is an extra layer of security used when logging into websites or apps. With 2FA, users have to log in with their username and password and provide a second form of authentication, such as a code generated by an application on their mobile device or a text message. This additional step makes...
Read More
Three malicious Chrome extensions, posing as VPNs, were force-installed 1.5 million times, causing significant concern for users’ security. These extensions, netPlus (1 million installs), netSave, and netWin (500,000 installs), were found to be browser hijackers, cashback hack tools, and data stealers. The malicious extensions were spread via an installer hidden in pirated copies of popular...
Read More
1 2 3 4 10