Aim and Scope
The International Journal of Computational Intelligence and Information Security (IJCIIS) aims to publish original and state-of-the-art research in the field of Computational Intelligence, Information Security and their applications. IJCIIS invites authors to submit their original and unpublished work in this field with a focus on new and emerging applications. IJCIIS also welcomes excellent quality research papers, review/survey papers in the area of Computer Science, Information Technology, and Information Systems. IJCIIS also accepts research papers from Engineering/Technology and Science disciplines. IJCIIS is a peer-review journal and papers submitted to IJCIIS will be reviewed by an expert reviewer in the field.
IJCIIS is a referred and excellent professional journal covering information technology, and its future aspects. It also demonstrates one of the leading journals in the area of management, and economic field.
The journal provides excellent platform for early career researchers, research scholars, higher degree research students (PhD and Masters) and other researchers to publish their research papers. Journal's policy is to minimize the review time, affordable publication/processing fees (very less) and therefore fast publication process.
International Journal of Computational Intelligence and Information Security aims to accommodate all the papers with emerging/latest developments in the field of Engineering, Technology, Manufacturing and Applied Science.
Celebrating Seventh Year of Publication
IC Value in 2011: 6.13
IC Value in 2010: 5.58
Journal Topics (But not limited to:)
Artificial Neural Networks, Data Mining and Fusion, Distributed Systems, Evolutionary Algorithms, Fuzzy Systems, Image Understanding,
Intelligent Systems, Knowledge Discovery, Machine Learning, Multi-Agent Systems, Neural-Fuzzy Systems, Pattern Recognition,
Reinforcement Learning, Self-Organizing Maps, Statistical Data Analysis, Supervised Learning, Support Vector Machines,
Authentication and Authorization, Computer Forensics, Cryptography and Coding, Hash Functions, Information and System Integrity,
Information Hiding, Information Security Management, Internet/Intranet Security, Intrusion Detection, Key/Identity Management,
Malicious Codes, Mobile Code & Agent Security, Mobile Communications Security, Network & Wireless Security, Public Key
Cryptosystems, Public Key Infrastructure, Secret Sharing, Security Analysis Methodologies, Security Management, Security Models and
Biometrics, Communication Security, Computer Security, Content Security, Copyright Protection, Cryptography and Applications,
Data Privacy, Database Security, Detection of Abnormality, Digital Signatures, Distributed Systems Security, Electronic Commerce
Security, Financial Security, Identity Theft and Management, Information Discovery, Mobile Device Security, Multimedia Security,
Software Encryption, System Security, Web Authentication, Web Privacy and Trust, Web Security and Integrity
Original research papers in the areas of Information Systems, Information Technology, Computer Science, Computer Engineering,
Electronic Engineering, Electrical Engineering, Mechanical Engineering, Environmental Engineering/Science, Bio-informatics, Project Management, E-Commerce, Web Development, Civil Engineering, Power Electronics, Industrial Electronics, VLSI Design and Management.