International Journal of Communication Networks and Information Security (IJCNIS)


ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.

___________________________________________________________________________________________________________________________________________________

Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.

___________________________________________________________________________________________________________________________________________________

Indexing/ Abstracting

· SCOPUS
· INSPEC                        
· EBSCO
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest 
· Gale/ Cengage
· InfoTrac
· Academic One
___________________________________________________________________________________________________________________________________________________

Announcements

 
No announcements have been published.
 
More Announcements...

Vol 10, No 2 (2018)

Table of Contents

Research Articles

Ferry–Based Directional Forwarding Mechanism for Improved Network Life-Time in Cluster-Based Wireless Sensor Network PDF
Ali Ahmad Eyadeh, Mohammad Bani Amerah
Dynamic Network State Learning Model for Mobility Based WMSN Routing Protocol PDF
Ajina A, Mydhili K. Nair
A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems PDF
Ali M Shatnawi, Bushra AlHajouj, Moath Jarrah
Performance Analysis of User Speed Impact on IEEE 802.11ah Standard affected by Doppler Effect PDF
Abdul Aziz Marwan, Doan Perdana, Danu Dwi Sanjoyo
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System PDF
Bisyron Wahyudi Masduki, Kalamullah Ramli, Hendri Murfi
PERFORMANCE ANALYSIS IN WIRELESS POWERED D2D- AIDED NON-ORTHOGONAL MULTIPLE ACCESS NETWORKS PDF
Dinh-Thuan Do
PMSS: Producer Mobility Support Scheme Optimization with RWP Mobility Model in Named Data Networking PDF
Muktar Hussaini, S. A. Nor, A. Ahmad
Assisted Navigation Algorithm for Wireless Sensor Actuator and Robot Networks PDF
Franco Frattolillo
OpenDaylight vs. Floodlight: Comparative Analysis of a Load Balancing Algorithm for Software Defined Networking PDF
Jonier Porras, Daniel Ducuara, Gustavo Puerto
Statistical-Based Heuristic for Scheduling of Independent Tasks in Cloud Computing PDF
Ahmad Al-Qerem, Ala Hamarsheh
Fuzzy Logic based Intrusion Detection System against Black Hole Attack in Mobile Ad Hoc Networks PDF
Houda Moudni, Mohamed Er-rouidi, Hicham Mouncif, Benachir El Hadadi
A New Approach in Expanding the Hash Size of MD5 PDF
Esmael Verano Maliberan, Ariel M Sison, Ruji P Medina
Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks PDF
Rolysent Paredes, Ariel M Sison, Ruji P Medina
Attacking AES-Masking Encryption Device with Correlation Power Analysis PDF
Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan
Implementing Enhanced MIMO with F-OFDM to Increase System Efficiency for Future 5G Cellular Networks PDF
tariqullah jan
Delay aware optimal resource allocation in MU MIMO-OFDM using enhanced spider monkey optimization PDF
Voruganti Hindumathi, Katta Rama Linga Reddy
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks PDF
Yaser Khamayseh, Rabiah Al-qudah
Using Quaternion Fourier Transform in Steganography Systems PDF
Magdy Ibrahim ElSharkawy
Reliability and Failure Functions of the Consecutive k-out-of-m-from-n: F Linear and Circular System PDF
Imad I.H. Nashwan
A Multilevel Scheduling MAC Protocol for Underwater Acoustic Sensor Networks(UASN) PDF
Sri Lekha

Surveys/ Reviews

Internet Voting Protocols: An Analysis of the Cryptographic Operations per Phase PDF
Cristina Satizabal, Rafael Paez
A CASE STUDY OF VARIOUS WIRELESS NETWORK SIMULATION TOOLS PDF
V Venkataramanan, S Lakshmi


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)