INFORMATION CHANGE THE WORLD

Aims and Scope

International Journal of Computer Network and Information Security(IJCNIS) is a peer reviewed journal in the field of Computer Network and Information Security. The journal is published 12 issues per year by the MECS Publisher from 2012. All papers will be blind reviewed. Accepted papers will be available on line (free access) and in printed version. No publication fee.

 

The journal publishes original papers in the field of computer network and information security which covers, but not limited to the following scope:

 

New generation network and its application 
Network architectures and protocols 
Network University 
Network Curriculum 
Computer Network Education 
Computer Distance Learning 
IPV6
Wireless Network
Wireless sensors networking
Grid Computing 
Cloud computing 
Cluster Computing 
Distributed computing 
Peer-to-Peer network
RFID Technologies
E-commerce protocols 
E-Health 
Intrusion Detection and Prevention 
Biometric Security and Artificial Intelligence
Cryptography and security protocols 
Authentication and Identification 
Mobile System Security 
Security in social networks
Security for web services
Sensor and Mobile Ad Hoc Network 
Security for Web Services 
Security for Personal Data and Databases 
Piracy detection and tracing
Denial of Service and other attacks 
Management of Computing Security 
Intelligent Multimedia Security Services 
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
B3G Systems, WiMAX and WLAN
Authentication, Authorization and Billing
Applications and Services for B3G/4G era
Radio Resource Management
Network measurement and Management
Theory and Models of Trust
Trust computing 
Education of network 
Bayesian Networks, Fuzzy and Rough Set

Intrusion Detection and Prevention 
Biometric Security and Artificial Intelligence
Cryptography and security protocols 
Authentication and Identification 
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security 
Ubiquitous Computing Security 
Sensor and Mobile Ad Hoc Network Security 
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing 
Security for Web Services 
Security for Personal Data and Databases 
Peer-to-Peer Security 
Risk Assessment 
Forecasting Terrorism 
Denial of Service and other attacks 
Management of Computing Security 
Intelligent Multimedia Security Services 
Knowledge Discovery and Data Mining