Aims and Scope

 

International Journal of Computer Network and Information Security(IJCNIS) is a peer reviewed journal in the field of Computer Network and Information Security. The journal is published 12 issues per year by the MECS Publisher from 2012. All papers will be blind reviewed. Accepted papers will be available on line (free access) and in printed version. No publication fee.

 

The journal publishes original papers in the field of computer network and information security which covers, but not limited to the following scope:

 

New generation network and its application
Network architectures and protocols
Network University
Network Curriculum
Computer Network Education
Computer Distance Learning
IPV6
Wireless Network
Wireless sensors networking
Grid Computing
Cloud computing
Cluster Computing
Distributed computing
Peer-to-Peer network
RFID Technologies
E-commerce protocols
E-Health
Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Mobile System Security
Security in social networks
Security for web services
Sensor and Mobile Ad Hoc Network
Security for Web Services
Security for Personal Data and Databases
Piracy detection and tracing
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Authentication, Authorization and Billing
Applications and Services for B3G/4G era
Radio Resource Management
Network measurement and Management
Theory and Models of Trust
Trust computing
Education of network
Bayesian Networks, Fuzzy and Rough Set

Intrusion Detection and Prevention
Biometric Security and Artificial Intelligence
Cryptography and security protocols
Authentication and Identification
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security
Ubiquitous Computing Security
Sensor and Mobile Ad Hoc Network Security
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing
Security for Web Services
Security for Personal Data and Databases
Peer-to-Peer Security
Risk Assessment
Forecasting Terrorism
Denial of Service and other attacks
Management of Computing Security
Intelligent Multimedia Security Services
Knowledge Discovery and Data Mining