International Journal of Communication Networks and Information Security (IJCNIS)


ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.

___________________________________________________________________________________________________________________________________________________

Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.

___________________________________________________________________________________________________________________________________________________

Indexing/ Abstracting

· SCOPUS
· INSPEC                        
· EBSCO
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest 
· Gale/ Cengage
· InfoTrac
· Academic One
___________________________________________________________________________________________________________________________________________________

Announcements

 
No announcements have been published.
 
More Announcements...

Vol 11, No 3 (2019)

Table of Contents

Research Articles

Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks PDF
Abdullah Shakir, Raed Alsaqour, Maha Abdelhaq, Amal Alhussan, Mohd Othman, Ahmed Mahdi
Identity Verification through Face Recognition Implemented on Raspberry Pi Framework PDF
Alvin Jason Virata, Enrique Festijo
Exploiting Blockchains to improve Data Upload and Storage in the Cloud PDF
Yassine EL KHANBOUBI, Mostafa Hanoune
Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT PDF
priyang prakashchandra Bhatt, Bhaskar V Thakker
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks PDF
Salim EL KHEDIRI, Rehan Ullah Khan, Waleed Albattah
LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON PDF
Febrian Wahyu Christanto, Susanto Susanto, Agus Priyanto
Performance Evaluation of Soil Substance Measurement System in Garlic Plant based on Internet of Things with Mesh Topology Network Scenario PDF
Doan Perdana, Muhammad Imadudin, Gustommy Bisono
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection PDF
May A. Alotaibi, Mohammed A. AlZain, Ben Soh, Mehedi Masud, Jehad Al-Amri

Surveys/ Reviews

IoT Security Evolution: Challenges and Countermeasures Review PDF
Ali M. A. Abuagoub
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review PDF
Jhon Francined Herrera-Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González-Crespo
A Survey of ARX-based Symmetric-key Primitives PDF
Nur Fasihah Mohd Esa, Shekh Faisal Abdul Latip, Mohd Rizuan Baharon


International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)