International Journal of Communication Networks and Information Security (IJCNIS)


ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.

___________________________________________________________________________________________________________________________________________________

Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.

___________________________________________________________________________________________________________________________________________________

Indexing/ Abstracting

· SCOPUS
· INSPEC                        
· EBSCO
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest
· Directory of Open Access Journals (DOAJ) - Computer Science 
· Gale/ Cengage
· InfoTrac
· Academic One
___________________________________________________________________________________________________________________________________________________

Announcements

 
No announcements have been published.
 
More Announcements...

Vol 8, No 3 (2016)

Table of Contents

Research Articles

A collaborative framework for intrusion detection (C-NIDS) in Cloud computing PDF
zayed alhaddad, Mostafa Hanoune, Abdelaziz Mamouni
Calculating and Evaluating Trustworthiness of Certification Authority PDF
Zakia EL UAHHABI, Hanan EL BAKKALI
Energy efficient multipath routing protocol for MANET for enhancing QoS and QoE in multimedia applications PDF
vallala Sowmya Devi
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring PDF
Ruki Harwahyu, Misbahuddin Misbahuddin, Riri Fitri Sari
MMEDD: Multithreading Model for an Efficient Data Delivery in wireless sensor networks PDF
Blaise Omer YENKE, Damien WOHWE SAMBO, Ado Adamou ABBA ARI, Aldelhak GUEROUI
Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks PDF
S. M. Kamruzzaman
DPCA: Dual Phase Cloud Infrastructure Authentication PDF
R Thandeeswaran, M A Saleem Durai
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm PDF
Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan
Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks PDF
NageswaraRao Sirisala, Shoba Bindu C
An Improved Solar Low Energy Adaptive Clustering Hierarchy (IS-LEACH) Technique PDF
Khalid M. Al-Smoul, Thamer Alrwashdeh, Ali A. Al-Dahoud

Surveys/ Reviews

Security and Privacy Issues in IoT PDF
Aqeel ur Rehman, Sadiq ur Rehman, Iqbal Uddin Khan, Muzaffar Moiz, Sarmad Hasan


IJCNIS©: Kohat University of Science and Technology (KUST), Pakistan