International Journal of Communication Networks and Information Security (IJCNIS)


ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.

___________________________________________________________________________________________________________________________________________________

Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.

___________________________________________________________________________________________________________________________________________________

Indexing/ Abstracting

· SCOPUS
· INSPEC                        
· EBSCO
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest
· Directory of Open Access Journals (DOAJ) - Computer Science 
· Gale/ Cengage
· InfoTrac
· Academic One
___________________________________________________________________________________________________________________________________________________

Announcements

 
No announcements have been published.
 
More Announcements...

Vol 10, No 1 (2018)

Table of Contents

Research Articles

An algorithm for enhancing coverage and network lifetime in cluster-based Wireless Sensor Networks PDF
Walid Osamy, Ahmed M Khedr
Balanced Multi-Channel Data Collection in Wireless Sensor Networks PDF
zahra adelani, Ghasem Mirjalily, Milad HajMirzaei
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies PDF
Kutub Thakur, Juan Shan, Al-Sakib Khan Pathan
Coverage and Energy Efficiency Optimization for Randomly Deployed Multi-Tier Wireless Multimedia Sensor Networks PDF
Taner Cevik, Alex Gunagwera
S-RLNC based MAC Optimization for Multimedia Data Transmission over LTE/LTE-A Network PDF
Veeresh Patil, Sanjeev Gupta, C. Keshavamurthy
Enhanced PF Scheduling Algorithm for LTE Networks PDF
Renê Pomilio de Oliveira, Lourival Aparecido de Góis, Augusto Foronda
An Adaptive FLV Steganography Approach Using Simulated Annealing PDF
Mohammed J. Bawaneh, Atef Obeidat, Majd M.Al-kofahi
Capacity Enhancement of Multiuser Wireless Communication System through Adaptive Non-Linear Pre coding PDF
Neeraj Kumar, Dalveer Kaur
Node Density Performance Analysis on IEEE 802.11ah Standard for VoIP Service PDF
Triani Wulandari, Doan Perdana, Ridha Muldina Negara
Enhanced Home Energy Management Scheme (EHEM) in Smart Grids PDF
Muneer Bani Yassein
SRAD: Smart Routing Algorithm Design for Supporting IoT Network Architecture PDF
ANNOP MONSAKUL
Determination of Itinerary Planning for Multiple Agents in Wireless Sensor Networks PDF
Amine Rais, KHALID BOURAGBA, Mohamed Ouzzif
A New Scheme for Spreading & De-spreading in the Direct Sequence Spread Spectrum Mechanism PDF
Magdy Ibrahim ElSharkawy
TiSEFE: Time Series Evolving Fuzzy Engine for Network Traffic Classification PDF
Shubair Abdulla, Amaal Saleh Al Hashimy
Performance Analysis of SAP-NFC Protocol PDF
Mustafa Al-Fayoumi, Shadi Nashwan
Private and Mobile inter-network routing for Wireless Sensor Networks and Internet of Things PDF
Mohsen Saberi
Performance Analysis of Mobility Impact on IEEE 802.11ah Standard with Traffic Pattern Scheme PDF
Riski Muktiarto Nugroho Ajinegoro, Doan Perdana, Ridha Muldina Negara
Biometric Face Recognition Based on Enhanced Histogram Approach PDF
Qeethara Kadhim Al-Shayea, Muzhir Al-Ani
Split and Merge LEACH Based Routing Algorithm for Wireless Sensor Networks PDF
Maha Zayoud, H. M Abdulsalam, A Al-Yatama, Seifedine Kadry
New Holes and Boundary Detection Algorithm for Heterogeneous Wireless Sensor Networks PDF
Ahmed Khedr, Arwa Attia
AARF-HT: Adaptive Auto Rate Fallback for High-Throughput IEEE 802.11n WLANs PDF
Hery Munanzar, Teuku Yuliar Arif, Syiahrial Syahrial
Multipoint Relay Selection based on Stability of Spatial Relation in Mobile Ad hoc Networks PDF
Ayoub Abdellaoui, Jamal Elmhamdi, Halim Berradi
Efficient Clustering Protocol Based on Stochastic Matrix & MCL and Data Routing for Mobile Wireless Sensors Network PDF
Omnia Mezghani, Mahmoud Abdellaoui
A Novel and Low Processing Time ECG Security Method Suitable for Sensor Node Platforms PDF
Jusak Jusak, Seedahmed Sharif Mahmoud
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm PDF
Ariel Roy L Reyes, Enrique D Festijo, Ruji P Medina
Improving Vehicular Authentication in VANET Using PDF
Rasha Al-Mutiri, Mznah Al-Rodhaan, Yuan Tian

Surveys/ Reviews

Decoding of Decode and Forward (DF) Relay Protocol using Min-Sum Based Low Density Parity Check (LDPC) System PDF
Jamaah Binti Suud, Hushairi Zen, Al-Khalid Othman, Khairuddin Ab Hamid
Opportunistic Networks: Present Scenario- A Mirror Review PDF
Anand Nayyar, Ranbir Singh Batth, Dac Binh Ha, G Sussendran


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)