International Journal of Communication Networks and Information Security (IJCNIS)


ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.

___________________________________________________________________________________________________________________________________________________

Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.

___________________________________________________________________________________________________________________________________________________

Indexing/ Abstracting

· SCOPUS
· INSPEC                        
· EBSCO
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest 
· Gale/ Cengage
· InfoTrac
· Academic One
___________________________________________________________________________________________________________________________________________________

Announcements

 
No announcements have been published.
 
More Announcements...

Vol 11, No 1 (2019)

Table of Contents

Research Articles

SEPCS: Prolonging Stability Period of Wireless Sensor Networks using Compressive Sensing PDF
Dina Omar, Ahmed Khedr
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication PDF
Esmael Verano Maliberan
A Rate Control Model of MPEG-4 Encoder for Video Transmission over Wireless Sensor Network PDF
Farizah Yunus
Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals PDF
Mohammed SABER, Abdessamad EL RHARRAS, Rachid SAADANE, Hatim KHARRAZ AROUSSI, Mohammed WAHBI
New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm PDF
Zouhair Chiba
ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments PDF
Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Deon Du Plessis, Solly Maswikaneng, Topside Mathonsi
A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring PDF
A Basnet, Abeer Alsadoon, P.W.C Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi
Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance PDF
ahmed jedidi
Image Encryption and Decryption Using Chua’s Circuits PDF
Mohammed Abdullah Alsaedi
Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method PDF
Deris Stiawan, Diky Aryandi, Ahmad Heryanto, Tri Wanda Septian, Farkhana Muchtar, Mohd. Yazid Idris, Rahmat Budiarto
A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network PDF
Felomino Porras Alba, Enrique D Festijo, Ruji P Medina
Traffic congestion prevention system PDF
Hamza TOULNI, Mounia MIYARA, Benayad NSIRI, Mohcine BOUDHANE
Application-based authentication on an inter-VM traffic in a Cloud environment PDF
Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai Andaloussi, Abderrahim Sekkaki
A Hybrid Algorithm for Reliable and Energy-efficient Data Gathering in Wireless Sensor Networks PDF
Mohammed Falah Abood Salman, Leili Farzinvash
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication PDF
Mohamed EL GHAZOUANI, Moulay Ahmed EL KIRAM, Latifa Er-Rajy
Dynamic Detection of Software Defects Using Supervised Learning Techniques PDF
Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi
Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference PDF
Dalveer Kaur, Neeraj Kumar
CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network PDF
rafat alhanani, Jaafar Abouchabaka, Najat Rafalia
Evaluation of DoS attacks on Commercial Wi-Fi-Based UAVs PDF
Gabriel Vasconcelos, Rodrigo Miani, Vitor Guizlini, Jefferson Souza
A New Variant of Game Theory Based Decision Making (GTDM) Algorithm Routing Protocols to Improve Energy Efficiency on Vehicular Delay Tolerant Network (VDTN) PDF
Muhammad Biben Triadi, Doan Perdana, Rendy Munadi, Li Wenzao
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION PDF
AMJAD Yosef HENDI, Majed Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S Soliman
Smart Relay Selection Scheme Based on Fuzzy Logic with Optimal Power Allocation and Adaptive Data Rate Assignment PDF
Nayab Taj, Mohammad Haseeb Zafar, Shakeel Ahmad Waqas, Humaira Rehman, Madini O Alassafi, Imran Khan

Surveys/ Reviews

Efficient and Secure ECDSA Algorithm and its Applications: A Survey PDF
Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
Review on Leakage Resilient Key Exchange Security Model PDF
Zheng Wei Clement Chan, Chai Wen Chuah, Janaka Alawatugoda


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)