International Journal of Computer Networks and Communications Security

Call For Papers


We are pleased to inform you that IJCNCS is going to launch its Next issue in April-2020. We would like to invite you to contribute a Research Paper for publication in IJCNCS. Papers published in IJCNCS will receive very high publicity and acquire very high reputation. The journal covers all areas of computer science, Software engineering, Information technology, and many more ( We publish original research articles, review articles and technical notes. The journal reviews papers within one week of submission and publishes accepted articles on the internet immediately upon receiving the final versions. Our fast reviewing process is our strength.

Important Date: Volume 8, Issue 4 and April - 2020


Submission Deadlines: 20th April 2020. (Open)
Author Notification: Within 1 to 2 weeks after submission.
Online Publishing: 30th April 2020.


The aim of IJCNCS is to publish peer reviewed research and review articles in rapidly developing field of computer science and network communication and software engineering. This journal is an online journal having full access to the research and review paper. The journal also seeks clearly written survey and review articles from experts in the field, to promote insightful understanding of the state-of-the-art and application trends. IJCNCS aims to cover the latest outstanding developments in the field of Computer science and Technology but not limited to the following branches:

Computer Networks:

  • Broadband access networks
  • Wireless Internet
  • Software defined & ultra-wide band radio
  • Bluetooth technology
  • Wireless Ad Hoc and Sensor Networks
  • Wireless Mesh Networks
  • IEEE 802.11/802.20/802.22
  • Biologically inspired communication
  • Management, monitoring, and diagnosis of networks
  • Network architecture
  • Emerging issues in 3G and 4G networks
  • Fault tolerance, dependability, reliability, and localization of fault
  • Network coding
  • Wireless telemedicine and e-health
  • Emerging wireless network security issues
  • Multimedia networks
  • Cognitive Radio Systems
  • Cooperative wireless communications
  • Data gathering, fusion, and dissemination
  • Networks and wireless networks security issues
  • Cross-layer optimization and cross-functionality designs
  • Admission/Congestion/Flow Control
  • Adaptive applications
  • Authentication, authorization, accounting
  • Broadband Networks
  • Microwaves, Antennas, Propagation
  • Channel Estimation and Cancellation
  • Communication
  • Communication Software
  • Communication Systems Architectures and Protocols
  • Broadband Communications
  • IPv6 deployment & migration
  • Location-dependent services
  • Internet and Web Applications
  • High-speed access networks
  • Admission/Congestion/Flow Control
  • Adaptive applications
  • Congestion Management
  • Internet and distributed computer systems
  • Home and SOHO networks
  • Local area networks
  • Embedded networks
  • Cross-layer optimization
  • Interconnection Networks
  • Congestion & flow control
  • and Any topics related to Computer Networks

Communications Network:

  • Ad-Hoc, Mobile, Wireless Networks and Mobile Computing
  • Agent Computing & Multi-Agents Systems
  • Quantum Computing, Coding, and Error Controls
  • Defining Spectrum Rights and Open Spectrum Solutions
  • Quality of Services and Communication Protocols
  • CDMA/GSM Communication Protocols
  • Satellite and Optical Communication Systems
  • 3G/4G Network Evolutions
  • Mobile Computing for e-Commerces
  • and Any topics related Communications Network

Network Security:

  • Network and Wireless Network Security
  • Mobile, Ad Hoc and Sensor Network Security
  • Peer-to-Peer Network Security
  • Database and System Security
  • Intrusion Detection and Prevention
  • Internet Security & Applications
  • Security & Network Management
  • E-mail security, Spam, Phishing, E-mail fraud
  • Virus, worms, Trojon Protection
  • Security threats & countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc,)
  • Ubiquitous Computing Security
  • Web 2.0 security
  • Cryptographic protocols
  • Performance Evaluations of Protocols & Security Application
  • and Any topics related to Network Security

Information Security:

  • Cryptography and Foundation of Computer Security
  • Authentication/Authorization Issues
  • Any topics related PKI (Public Key Infrastructures)
  • E-comerce, Ubiquitous, RFID, Applications
  • IC-card Security, OTP, and Key Management Issues
  • Fingerprint /Hand/Biometrics Recognitions  and  Technologies
  • Biometric authentication and algorithms
  • Network Security Applications
  • Wireless Access Security
  • IDS/Firewall, Anti-Spam mail, Anti-virus issues
  • Any topics related ISO SC-27 and SC-17 standards
  • and Any topics related to Information Security