International Journal of Computational Intelligence and Information Security (IJCIIS)

ISSN: 1837-7823

Aim and Scope

The International Journal of Computational Intelligence and Information Security (IJCIIS) aims to publish original and state-of-the-art research in the field of Computational Intelligence, Information Security and their applications. IJCIIS invites authors to submit their original and unpublished work in this field with a focus on new and emerging applications. IJCIIS also welcomes excellent quality research papers, review/survey papers in the area of Computer Science, Information Technology, and Information Systems. IJCIIS also accepts research papers from Engineering/Technology and Science disciplines. IJCIIS is a peer-review journal and papers submitted to IJCIIS will be reviewed by an expert reviewer in the field. 

IJCIIS is a referred and excellent professional journal covering information technology, and its future aspects. It also demonstrates one of the leading journals in the area of management, and economic field.

The journal provides excellent platform for early career researchers, research scholars, higher degree research students (PhD and Masters) and other researchers to publish their research papers. Journal's policy is to minimize the review time, affordable publication/processing fees (very less) and therefore fast publication process. 

International Journal of Computational Intelligence and Information Security aims to accommodate all the papers with emerging/latest developments in the field of Engineering, Technology, Manufacturing and Applied Science. 

Celebrating Seventh Year of Publication

      IC Value in 2011: 6.13

      IC Value in 2010: 5.58

Journal Topics (But not limited to:)

        Computational Intelligence

Artificial Neural Networks, Data Mining and Fusion, Distributed Systems, Evolutionary Algorithms, Fuzzy Systems, Image Understanding, 

Intelligent Systems, Knowledge Discovery, Machine Learning, Multi-Agent Systems, Neural-Fuzzy Systems, Pattern  Recognition, 

Reinforcement Learning, Self-Organizing Maps, Statistical Data Analysis, Supervised Learning, Support Vector Machines, 

Unsupervised Learning


Information Security

Authentication and Authorization, Computer Forensics, Cryptography and Coding, Hash Functions, Information and System Integrity, 

Information Hiding, Information Security Management, Internet/Intranet Security, Intrusion Detection, Key/Identity Management, 

Malicious Codes, Mobile Code & Agent Security, Mobile Communications Security, Network & Wireless Security, Public Key 

Cryptosystems, Public Key Infrastructure, Secret Sharing, Security Analysis Methodologies, Security Management, Security Models and 

Architectures, Watermarking



Biometrics, Communication Security, Computer Security, Content Security, Copyright Protection, Cryptography and Applications, 

Data Privacy, Database Security, Detection of Abnormality, Digital Signatures, Distributed Systems Security, Electronic Commerce 

Security, Financial Security, Identity Theft and Management, Information Discovery, Mobile Device Security, Multimedia Security, 

Software Encryption, System Security, Web Authentication, Web Privacy and Trust, Web Security and Integrity

Other Areas

Original research papers in the areas of Information Systems, Information Technology, Computer Science, Computer Engineering, 

Electronic Engineering, Electrical Engineering, Mechanical Engineering, Environmental Engineering/Science, Bio-informatics, Project Management, E-Commerce, Web Development, Civil Engineering, Power Electronics, Industrial Electronics, VLSI Design and Management.