INFORMATION CHANGE THE WORLD

Aims and Scope

IJCNIS is committed to bridge the theory and practice of computer network and information security. From innovative ideas to specific algorithms and full system implementations, IJCNIS publishes original, peer-reviewed, and high quality articles in the areas of computer network and information security. IJCNIS is well-indexed scholarly journal and is indispensable reading and references for people working at the cutting edge of computer network, information security, and their applications.


IJCNIS publishes 12 issues per year. Published papers will be available on line (free access) and in printed version. IJCNIS covers the following topics (but not limited to):

 

New generation network and its application 
Network architectures and protocols 
Computer Network Education 
Computer Distance Learning 
Grid Computing 
Cloud computing 
Cluster Computing 
Distributed computing
Trust computing
Peer-to-Peer network

RFID Technologies
E-commerce protocols 
E-Health 
Intrusion Detection and Prevention 
Biometric Security and Artificial Intelligence
Cryptography and security protocols 
Authentication and Identification 
Piracy detection and tracing
Denial of Service and other attacks 
Management of Computing Security 
Intelligent Multimedia Security Services 
Channel Modeling and Characterization
Modulation/Coding/Signal Processing
Authentication, Authorization and Billing
Radio Resource Management
Network measurement and Management
Bayesian Networks, Fuzzy and Rough Set

Biometric Security and Artificial Intelligence
Cryptography and security protocols 
Authentication and Identification 
Bayesian Networks, Fuzzy and Rough Set
Mobile System Security 
Ubiquitous Computing Security 
Sensor and Mobile Ad Hoc Network Security 
Security in social networks
Security for web services
Security in Wireless Network
Security of GSM/GPRS/UMTS systems
Security for Grid Computing 
Security for Web Services 
Security for Personal Data and Databases
Peer-to-Peer Security 
Risk Assessment 
Forecasting Terrorism 
Management of Computing Security 
Intelligent Multimedia Security Services