Описание: | International Journal of Computer Network and Information Security(IJCNIS) is a peer reviewed journal in the field of Computer Network and Information Security. The journal is published 12 issues per year by the MECS Publisher from 2012. All papers will be blind reviewed. Accepted papers will be available on line (free access) and in printed version. No publication fee.
IJCNIS is publishing refereed, high quality original research papers in all areas of Computer Network and Information Security.
IJCNIS has been indexed by several world class databases: Google Scholar, Microsoft Academic Search, CrossRef, DOAJ, IndexCopernicus, INSPEC(IET), EBSCO, VINITI, JournalSeek, ULRICH's Periodicals Directory, WordCat, Scirus, Academic Journals Database, Stanford University Libraries, Cornell University Library, UniSA Library, CNKI Scholar, ProQuest, J-Gate, ZDB, BASE, OhioLINK, iThenticate, Open Access Articles, Open Science Directory, National Science Library of Chinese Academy of Sciences, The HKU Scholars Hub, etc..
The journal publishes original papers in the field of computer network and information security which covers, but not limited to the following scope:
New generation network and its application Network architectures and protocols Network University Network Curriculum Computer Network Education Computer Distance Learning IPV6 Wireless Network Wireless sensors networking Grid Computing Cloud computing Cluster Computing Distributed computing Peer-to-Peer network RFID Technologies E-commerce protocols E-Health Intrusion Detection and Prevention Biometric Security and Artificial Intelligence Cryptography and security protocols Authentication and Identification Mobile System Security Security in social networks Security for web services Sensor and Mobile Ad Hoc Network Security for Web Services Security for Personal Data and Databases Piracy detection and tracing Denial of Service and other attacks Management of Computing Security Intelligent Multimedia Security Services Channel Modeling and Characterization Modulation/Coding/Signal Processing B3G Systems, WiMAX and WLAN Authentication, Authorization and Billing Applications and Services for B3G/4G era Radio Resource Management Network measurement and Management Theory and Models of Trust Trust computing Education of network Bayesian Networks, Fuzzy and Rough Set
Intrusion Detection and Prevention Biometric Security and Artificial Intelligence Cryptography and security protocols Authentication and Identification Bayesian Networks, Fuzzy and Rough Set Mobile System Security Ubiquitous Computing Security Sensor and Mobile Ad Hoc Network Security Security in Wireless Network Security of GSM/GPRS/UMTS systems Security for Grid Computing Security for Web Services Security for Personal Data and Databases Peer-to-Peer Security Risk Assessment Forecasting Terrorism Denial of Service and other attacks Management of Computing Security Intelligent Multimedia Security Services Knowledge Discovery and Data Mining
|