https://www.ijcnis.org/index.php/ijcnis/issue/feedInternational Journal of Communication Networks and Information Security (IJCNIS)2025-02-07T20:46:11+0530International Journal of Communication Networks and Information Security[email protected]Open Journal Systems<p><strong>International Journal of Communication Networks and Information Security (IJCNIS)</strong></p> <h3><strong>Contact Email: [email protected]</strong></h3> <p><strong>Basic Journal Information</strong></p> <ul> <li style="text-align: justify;"><strong>e-ISSN: </strong>2073-607X, <strong>p-ISSN:</strong> 2076-0930| <strong>Frequency</strong> (4 Issue Per Year) | <strong>Nature: </strong>Online and Print | <strong>Language of Publication: </strong>English | <strong>Funded By:</strong></li> <li style="text-align: justify;"><strong>Introduction: International Journal of Communication Networks and Information Security</strong> (IJCNIS) is a scholarly peer-reviewed international scientific journal published four times (March, June, September, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:</li> <ol> <li>Broadband access networks</li> <li>Wireless Internet</li> <li>Software defined & ultra-wide band radio</li> <li>Bluetooth technology</li> <li>Wireless Ad Hoc and Sensor Networks</li> <li>Wireless Mesh Networks</li> <li>IEEE 802.11/802.20/802.22</li> <li>Emerging wireless network security issues</li> <li>Fault tolerance, dependability, reliability, and localization of fault</li> <li>Network coding</li> <li>Wireless telemedicine and e-health</li> <li>Emerging issues in 3G, 4G and 5G networks</li> <li>Network architecture</li> <li>Multimedia networks</li> <li>Cognitive Radio Systems</li> <li>Cooperative wireless communications</li> <li>Management, monitoring, and diagnosis of networks</li> <li>Biologically inspired communication</li> <li>Cross-layer optimization and cross-functionality designs</li> <li>Data gathering, fusion, and dissemination</li> <li>Networks and wireless networks security issues</li> <li>Optical Fiber Communication</li> <li>Internet of Things (IoT)</li> <li>Signals and Systems</li> <li>Information Theory and Coding</li> <li>Cryptology</li> <li>Computer Neural Networks</li> <li>Mobile Edge Computing and Mobile Computing</li> <li>Image Encryption Techniques</li> <li>Affective Computing</li> <li>On-chip/Inter-chip Optical Networks</li> <li>Ultra-High-Speed Optical Communication Systems</li> <li>Secure Optical Communication Technology</li> <li>Neural Network Modeling and Dynamics Behavior Analysis</li> <li>Intelligent Manufacturing</li> <li>Big Data Systems</li> <li>Database and Intelligent Information Processing</li> <li>Complex Network Control and Memristor System Analysis</li> <li>Distributed Estimation, Optimization Games</li> <li>Dynamic System Fault Diagnosis</li> <li>Brain-Inspired Neural Networks</li> <li>Memristors</li> <li>Nonlinear Systems</li> <li>Signal and Information Processing</li> <li>Multimodal Information Fusion</li> <li>Blockchain Technology</li> </ol> <li><strong>IJCNIS publishes: </strong></li> </ul> <ul> <ul> <li>Critical reviews/ Surveys</li> <li>Scientific research papers/ contributions</li> <li>Letters (short contributions)</li> </ul> </ul> <ul> <li style="text-align: justify;"><strong>Peer Review Process: </strong>All submitted papers are subjected to a comprehensive blind review process by at least 2 subject area experts, who judge the paper on its relevance, originality, clarity of presentation and significance. The review process is expected to take 8-12 weeks at the end of which the final review decision is communicated to the author. In case of rejection authors will get helpful comments to improve the paper for resubmission to other journals. The journal may accept revised papers as new papers which will go through a new review cycle.</li> <li style="text-align: justify;"><strong>Periodicity: </strong>The Journal is published in 4 issues per year.</li> <li style="text-align: justify;"><strong>Editorial Contribution Percentage in Articles Per Year:</strong> 30%</li> </ul> <p> </p>https://www.ijcnis.org/index.php/ijcnis/article/view/7940Anomaly Detection Using Feature Selection to Identify Security Threats in Network Traffic 2025-02-04T10:19:26+0530Hussien Ibrahim Ali [email protected]<p>Feature selection is a crucial aspect of machine learning model development. In constructing a predictive model, not all variables in the dataset contribute equally. Feature selection involves identifying the most pertinent features from the original data and eliminating less significant ones, which can substantially impact model performance.</p> <p>This study proposes a new feature selection algorithm to improve the effectiveness of machine learning methods used to detect anomalies in network data. The proposed model calculates a sum score using three feature selection algorithms, which are the Mean Absolute Difference MAD, Feature Importance FI, and Chi-square. The final extracted features are then used to build anomaly detection models to identify network attacks.</p> <p>Performance evaluation using criteria such as accuracy, f1-score, and the time required to build and test the machine learning model indicate that the performance of proposed model is better than existing models in most scenarios, especially with the decision tree algorithm reaching an accuracy of 99.4 and f1-score of 0.99 on validation dataset, and accuracy of 80.19 and f1-score of 0.8 on test set<strong>.</strong></p>2025-02-04T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7941IPv6 Security Challenges: A comprehensive study of current issues and real case simulation2025-02-04T10:29:04+0530Mohamed Amaadid , M’barek El Haloui , Ali El Ksimi ,Badia Ettaki .[email protected]<p>The growing adoption of IPv6 protocol presents new security challenges. One of the core components of IPv6 is the neighbor discovery protocol (NDP) which manages the communications between neighboring devices and include the duplicate address detection (DAD) process, that ensures the uniqueness of every configured IPv6 address.</p> <p>Even though it is designed to improve the efficiency of communications, the DAD process presents significant vulnerabilities that can be exploited by attackers. These limitations are linked to ICMPv6 (Internet Control Message Protocol for IPv6) messages and can lead to severe attacks as spoofing and flooding, these attacks are not only compromising the security of communications but also affect the network availability, posing risks to network infrastructure.</p> <p>The present paper investigates these vulnerabilities by simulating two specific types of attacks: Spoofing and flooding. The simulations are conducted in a controlled environment and highlight the real-world impact of these attacks on network performance and service availability. This study allowed us to better understand the underlying mechanisms of these attacks to propose effective prevention and mitigation strategies.</p> <p>The goal of this research is the experimental evaluation of NDP vulnerabilities, especially within the DAD process, and the demonstration of their impact. Furthermore, it proposes a discussion of many practical solutions that are used in literature, such as cryptographic techniques and message filtering mechanisms, to secure IPv6 networks against these threats.</p>2025-02-01T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7944Impact of Multi Area OSPF Routing Protocols on IoT-Based Monitoring System2025-02-04T10:45:21+0530Yudha Alif Auliya , Antonius Cahya Prihandoko , S.Slamin , Diah Ayu Retnani Wulandari , Qurrota A’yuni Ar Ruhimat , 6Mohammad Zarkasi , Diksy Media Firmansyah [email protected]<p>This research aims to do a simulation of Open Shortest Path First (OSPF) protocol based Internet of Things (IoT)-based farm monitoring system using Cisco?Packet Tracer. OSPF in IoT networks must consider the aspects of scale and?resource management. If OSPF is configured incorrectly, it can lead to high overhead as well as increased power loss on Internet of Things?(IoT) devices. Therefore, designing and running networks open-structured exactly in the way that OSPF will be advantageous?for the IoT network is important. The Quality of Service (QoS) of OSPF protocol?on the IoT based monitoring system has been simulated in this research. In?this simulation, normal packet loss was 1% and the quickest delay was 0.06 seconds. The test results indicate that implementing the multi-area OSPF protocol enhances the performance and reliability of the IOT-based monitoring system<strong>.</strong></p>2025-02-01T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7945Graph-Partitioning Approaches for 3D Reconstruction: A Review in the Context of IoT2025-02-04T10:47:46+0530Hussein F. Alshareefi1*, Yaghoub Farjami2, Ali Tavakoli3[email protected]<p>Partitioning Approaches for 3D Reconstruction</p>2025-02-01T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7947AI-Powered Copilots Are Revolutionizing Low-Code Development in the Power Platform2025-02-04T11:33:33+0530Sudheekar Reddy Pothireddy [email protected]<p>In today’s rapidly evolving business landscape, the demand for agile application development and seamless workflow automation has never been more critical. AI-powered Copilots within Microsoft’s Power Platform represent a paradigm shift in low-code development, leveraging advanced natural language processing (NLP) and machine learning (ML) technologies to democratize app creation and workflow design. These intelligent assistants empower both developers and non-technical users to design, automate, and innovate with unprecedented efficiency.</p>2025-02-04T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7948Slinding Mode Control Tracking for Lateral Aircraft System 2025-02-04T12:30:17+0530Labane Chrif 1*, Mekkaoui Mohammed 2 Zemalache Meguenni Kadda 3Meddahi Youssouf 4[email protected]<p><em>A sliding mode control approach for ensure lateral control of an aircraft. This command is distinguished by its ability to stabilize the aircraft while making it follow a defined flight path in a manner precise. In addition, sliding mode control offers excellent robustness to external disturbances such as wind or turbulence, and makes it possible to overcome chatter problems often encountered with sliding mode control, which makes it makes it particularly suitable for controlling a sensitive system such as an aircraft. The simulations of the control laws were carried out with MATLAB. The linear system combined with the controller in sliding mode has been tested with reference instructions and step-type instructions to evaluate your performance. The results show that the order by sliding mode offers an efficient and precise solution for controlling the aircraft. This approach ensures fast tracking dynamics, high precision and good ability to reject disturbances. The system faithfully follows the reference trajectories, with errors almost zero in steady state for the controlled variables</em></p>2025-02-01T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7951AI-Generated Credit Scoring Models: Leveraging Machine Learning and Generative Networks for Financial Inclusion and Bias Mitigation in Credit Risk Assessment2025-02-05T17:40:50+0530Akshay Rajshekar Shiraguppi [email protected]<p>The objective of this research is to explore the role of Artificial Intelligence (AI), specifically Generative Adversarial Networks (GANs), in transforming traditional credit scoring systems, with a particular focus on improving financial inclusion and mitigating bias. Credit scoring has long been an essential component of <br>financial systems, determining access to credit based on an individual’s creditworthiness. However, traditional credit scoring methods often fail to account for the complexities of non-linear relationships in data and are limited by data biases, particularly when assessing underserved populations. This study aims to bridge these gaps by leveraging AI-driven techniques to offer a more inclusive, accurate, and fair credit scoring model.</p>2025-02-04T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7953Bridging the Gap: Integrating Batch and Streaming Data Paradigms for Holistic Analytics in the Age of Real-Time, Predictive, and Historical Insights2025-02-07T13:21:48+0530Sainath Muvva [email protected]<p>Background:As industries increasingly rely on data-driven decision-making, the growing volume and complexity of data have led to the widespread adoption of <br>analytics across sectors like finance, healthcare, IoT, and smart cities.Traditional systems, however, often rely on either batch processing for historical data or streaming data for real-time analysis, leading to fragmented insights. The integration of these two paradigms—historical and real-time data—has become essential to achieve a comprehensive view that reflects both past trends and immediate conditions, ultimately enabling organizations to make more informed and proactive decisions.</p>2025-02-06T00:00:00+0530Copyright (c) 2025 https://www.ijcnis.org/index.php/ijcnis/article/view/7955Medicative Tracking System in Hospital Services 2025-02-07T20:46:11+0530Maharaja Swathi,Dr S Srinivas [email protected]<p>The hospital's medicinal tracking system aids in keeping the overall number of patients in the facility. A patient records management system is an all-inclusive clinical information system for patient care that allows clinicians to quickly assess patients' medical histories and give better treatment. The hospital services project's medicinal tracking system is an Android-based effort to improve the effectiveness and efficiency of healthcare management. The goal of <br>this system is to improve administrative procedures and patient care by facilitating smooth communication and data management in a hospital setting.</p>2025-02-06T00:00:00+0530Copyright (c) 2025