International Journal of Communication Networks and Information Security (IJCNIS)

ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)

International Journal of Communication Networks and Information Security (IJCNIS) is a scholarly peer reviewed international scientific journal published three times (April, August, December) in a year, focusing on theories, methods, and applications in networks and information security. It provides a challenging forum for researchers, industrial professionals, engineers, managers, and policy makers working in the field to contribute and disseminate innovative new work on networks and information security. The topics covered by this journal include, but not limited to, the following topics:

• Broadband access networks
• Wireless Internet
• Software defined & ultra-wide band radio
• Bluetooth technology
• Wireless Ad Hoc and Sensor Networks
• Wireless Mesh Networks
• IEEE 802.11/802.20/802.22
• Emerging wireless network security issues
• Fault tolerance, dependability, reliability, and localization of fault
• Network coding
• Wireless telemedicine and e-health
• Emerging issues in 3G and 4G networks
• Network architecture
• Multimedia networks
• Cognitive Radio Systems
• Cooperative wireless communications
• Management, monitoring, and diagnosis of networks
• Biologically inspired communication
• Cross-layer optimization and cross-functionality designs
• Data gathering, fusion, and dissemination
• Networks and wireless networks security issues

IJCNIS publishes:

• Critical reviews/ Surveys
• Scientific research papers/ contributions
• Letters (short contributions)

To keep the price affordable to libraries and subscribers, we do not send complimentary reprints or complimentary copies to authors.


Peer Review

All manuscripts will be subject to a well established, fair, unbiased peer review and refereeing procedure, and are considered on the basis of their significance, novelty and usefulness to the Journals readership. The review output will be either accept or reject. A paper once rejected will not be considered again for review. The review process may take approximately two months to be completed. For accepted paper, should authors be requested by the editor to revise the text and minor changes, the revised version should be submitted within 1 month.


Indexing/ Abstracting

· INSPEC                        
· Cabell's Directory
· International Abstracts in Operations Research (IAOR)
· Ulrich's
· TOC Premier
· Computer and Information Systems Abstracts
· Computers and Applied Sciences Complete
· SciTech Journals
· Technology Journals
· Computer Science Journals
· Telecommunication Journals
· Science Journals
· Google Scholar
· International Security & Counter-Terrorism Reference Center
· Scirus
· ScientificCommons
· Genamics JournalSeek
· Advanced Technology and Aerospace Journals
· NewJour - Electronic Journals and Newsletters
· Intute - Science Engineering and Technology
· Open J-Gate
· Computing - ProQuest
· ProQuest Central
· Career and Technical Education
· Business Continuity & Disaster Recovery Reference Center
· Military Collection - ProQuest
· Professional Central - ProQuest
· Directory of Open Access Journals (DOAJ) - Computer Science 
· Gale/ Cengage
· InfoTrac
· Academic One


No announcements have been published.
More Announcements...

Vol 9, No 2 (2017)

Table of Contents

Research Articles

Discrete R-Contiguous bit Matching mechanism appropriateness for anomaly detection in Wireless Sensor Networks PDF
Muhammad Zeeshan, Huma Javed, Sifat Ullah
Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach PDF
Lekha J, Padmavathi Ganapathi
Optimized Job Scheduling approach based on Genetic algorithms in smart Grid environment PDF
Firas A. Albalas, Wail Mardini, Dua'a Bani-salameh
Black Hole attack Detection using fuzzy based IDS PDF
Mohammed Abdel-Azim, Hossam El-Din Salah, menas ebrahim eissa
A parallel implementation on a multi-core architecture of a dynamic programming algorithm applied in cognitive radio ad hoc networks PDF
Badr Benmammar, Youcef Benmouna, Asma Amraoui, Francine Krief
CALAR: Community Aware Location Assisted Routing Framework for Delay Tolerant Networks PDF
sweta jain, Vinuraj R
Quaternion-based Encryption/Decryption of Audio Signal Using Digital Image as Variable Key PDF
Magdy Ibrahim ElSharkawy
Mobility Adaptive Density Connected Clustering Approach in Vehicular Ad Hoc Networks PDF
Anant Ram, Manas Kumar Mishra
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols PDF
Eyad S. Taqieddin
Distributed Fault-Tolerant Algorithm for Wireless Sensor Networks PDF
Chafiq Titouna, Mourad Gueroui, Makhlouf Aliouat, Ado Adamou Abba Ari, Amine Adouane
Bio-Inspired Technique:An Adaptive Rοuting fοr Reliability and Energy Efficiency Method in Wireless Sensοr Netwοrks PDF
Ahmed Saleh
PFPS: Priority-First Packet Scheduler for IEEE 802.15.4 Heterogeneous Wireless Sensor Networks PDF
Sambhaji Sarode, Jagdish Bakal
A Comprehensive Cloud Security Model with Enhanced Key Management, Access Control and Data Anonymization Features PDF
Venifa Mini G, K. S. Angel Viji
Revealing the Feature Influence in HTTP Botnet Detection PDF
Nur Hidayah Mohd Saudi, Faizal M. A, Siti Rahayu Selamat, Rudy Fadhlee M. D, Wan Ahmad Ramzi W. Y
Digital Copyright Protection: Focus on Some Relevant Solutions PDF
Franco Frattolillo

Surveys/ Reviews

A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications PDF
Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah

International Journal of Communication Networks and Information Security (IJCNIS)          ISSN: 2076-0930 (Print)           ISSN: 2073-607X (Online)