International Journal of Communication Networks and Information Security (IJCNIS)

ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.


Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.


Indexing/ Abstracting

· INSPEC                        
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest 
· Gale/ Cengage
· InfoTrac
· Academic One


No announcements have been published.
More Announcements...

Vol 10, No 3 (2018)

Table of Contents

Research Articles

A Routing Delay Predication Based on Packet Loss and Explicit Delay Acknowledgement for Congestion Control in MANET PDF
Y Narasimha Reddy, P. V. S. Srinivas
Redundancy Elimination with Coverage Preserving algorithm in Wireless Sensor Network PDF
Shobha Biradar, P M Mallikarjuna Shastry
Security based partner selection in Inter-organizational workflow systems PDF
Asmaa Ali Elkandoussi, Hanan Elbakkali
Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks PDF
Jamil Al-Azzeh, Abdelwadood Mesleh, Hu Zhengbing, Roman Odarchenko,, Sergiy Gnatyuk, Anastasiia Abakumova
Enhancing the Performance of the Advanced Encryption Standard (AES) Algorithm Using Multiple Substitution Boxes PDF
Felicisimo Villarico Wenceslao, Jr.
An Improved Fully Homomorphic Encryption Scheme for Cloud Computing PDF
Mohd Rizuan Baharon, Qi Shi, Mohd Faizal Abdollah, S.M.WARUSIA MOHAMED S.M.M YASSIN, Ariff Idris
Shadi Elshare, Nameer N. EL-Emam
A New Distributed Intrusion Detection System Based on Multi-Agent System for Cloud Environment PDF
Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Directions PDF
Tariq Ahamed Ahanger
Energy efficient secured cluster based distributed fault diagnosis protocol for IoT PDF
Tabassum Ara
Node Activities Learning(NAL)Approach to Build Secure and Privacy-Preserving Routing in Wireless Sensor Networks PDF
Ramesh Rao Karanam
Muti-stage Key Management Scheme for Cluster based WSN PDF
Vijaya Saraswathi R
BotCap: Machine Learning Approach for Botnet Detection Based on Statistical Features PDF
Mohammed S. Gadelrab, Muhammad ElSheikh, Mahmoud A. Ghoneim, Mohsen Rashwan

Surveys/ Reviews

State of the Art Intrusion Detection System for Cloud Computing PDF
Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria
Available Bandwidth Estimation Tools Metrics, Approaches and Performance PDF
Dixon Salcedo, Cesar Guerrero, Roberto Martínez

International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)