Worldwide Journal of Computer Networks and Applications (IJCNA) is an insightful open access online global diary, which plans to distribute peer-assessed unique research papers in the field of Computer Networks and its applications. IJCNA expects to bring the new application advancements among the scientists and academician and IJCNA establishes the framework of sharing exploration information among the specialists. All the submitted papers are peer-checked on by the specialists in the significant field of Computer Networks and acknowledged papers are distributed online following getting the last form of the original copy in the up and coming ongoing issue.
Recurrence: IJCNA Publishes one volume with 6 issues for every year. (February, April, June, August, October, December)
Accommodation Deadline: There is no cutoff time for paper accommodation. Original copies can be submitted consistently.
DOI Prefix: 10.22247Google Scholar Citations of IJCNA
Note: Uses of computer in business
*IJCNA has no tie-up with an organization(s).
*IJCNA doesn't distribute meeting papers as customary or extraordinary issue.
*Acceptance got from "editor@ijcna.org" is just legitimate.
Most Viewed Most Recent Most Download
MNP: Malicious Node Prevention in Vehicular Ad hoc Networks
Huge Data Analysis for M2M Networks: Research Challenges and Open Research Issues
A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems
Use of Modified ACO Meta heuristic in Spray and Wait Routing
Assessment of the Effects of Measurement Interval on Artificial Neural Network-Based Prediction for Wireless Water Quality Monitoring Network
Portability Management Scheme Based on Smart Buffering for Vehicular Networks
A Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges
An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques
Examination of VBF convention in Underwater Sensor Network for Static and Moving Nodes
Improvement over AODV Considering QoS Support in Mobile Ad-hoc Networks
Assessment of TCP Congestion Control Modus Operandi in Mesh Networks
Investigating IOT Application Using Raspberry Pi
Availability Based Positioning System for Underground Vehicular Ad Hoc Networks
Plan and Security Simulation of Wi-Fi Networks
A Study of Machine Learning in Wireless Sensor Network
Execution Comparison among LTE and WiMAX Based on Link Level Simulation
Structure and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard
A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
Structure and Implementation of a Smart Home for the Elderly and Disabled
Mama LEACH: Energy Efficient Routing Protocol for WSNs utilizing Particle Swarm Optimization and Mobile Aggregator
Use of Machine Learning for Intrusion Detection in a Network
A Survey of Various Security Issues in Online Social Networks
Improved Route Discovery Mechanism of Ad-Hoc On Demand Distance Vector for MANET
The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions
Machine-to-Machine Communications for Smart Homes
Vitality Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach
A Delay and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
Self-Correcting Localization Scheme for Vehicle to Vehicle Communication
Plan of a Monitor for Detecting Money Laundering and Terrorist Financing
Improved Signcryption Algorithm for Information Security in Networks
A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing
A Probabilistic Key Management Protocol dependent on Kryptograph for WSN
Obstruction Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing
A Study on 5G Evolution and Revolution
Open Key Cryptography Techniques Evaluation
Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks
A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
Organized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
Remote Sensor Network-Based Health Monitoring System for the Elderly and Disabled
Productive Collaborative Technique utilizing Intrusion Detection System for Preserving Privacy in Location-based Services
A Study on Topology based Vehicular Ad hoc Network Routing Protocols
Upgraded Firewall with Traffic Awareness
Dynamic Node Recovery in MANET for High Recovery Probability
Security and Fraud Issues of E-banking
Programmed Feedback Framework for Deriving Educational Ontologies
Impact of Quarantine and Vaccination on Infectious Nodes in Computer Network
Security Concerns at Various Levels of Cloud Computing Paradigm: A Review
Time Based Fault Detection and Isolation In Wireless Sensors Network
A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks
A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks
Clone Attack Detection Using Pair Access Witness Selection Technique
Errand planning for Cloud Using Hybrid Cuckoo Algorithm
Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks
A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks
Versatile Routing Protocol dependent on Cuckoo Search calculation (ARP-CS) for made sure about Vehicular Ad hoc arrange (VANET)
Structure and Develop an Approach for Integrating Compression and Encryption on Textual Data
Digests Evaluation for Quality Assurance in Scientific Journal
IP Address Lookup in an IP Router Based On a Reorganized Binary Prefixes Value Tree (RBPVT)
Article Offer Supportive Review to Fresh Authors
Disclosure of Multi-Objective Overlapping Communities inside Social Networks utilizing a Socially Inspired Metaheuristic Algorithm
A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis
Structure and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks
Dispersed File Systems Implementation on an Edge Router utilizing GlusterFS for Cloud Applications
Blockage Aware Packet Routing For Delay Sensitive Cloud Communications
Execution Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks
A Novel Application based Generic Cluster Creation Mechanism in Ad Hoc Networks
Moderation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization
Vitality Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network
Usage of a Novel Protocol for Coordination of Nodes in Manet
Covering Community Detection in Social Networks Using Parliamentary Optimization Algorithm
A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP
TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
Similar Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System
A Framework for Effective Big information Analytics for Decision Support Systems
Security Enhancement in Shoulder Surfing Attacks utilizing Passpoints for Random Similar Images (PRSIm)
ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol
Virtualization and IoT Resource Management: A Survey
A Diffie-Hellman and Two Step Verification based Secure Cloud Computing Paradigm
Halfway Topology-Aware Data Distribution inside Large Unmanned Surface Vehicle Teams
Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review point of view
Literary Data Hiding in Digital Images Using Chaotic Maps
Framework and Cloud Computing Security: A Comparative Survey
Assessment of Optimum NPRACH Performance in NB-IoT Systems
QoS and Fuzzy Logic Based Routing Protocol for CRN
Versatile Power Transmission and Efficient Energy Scheme of DSR Protocol (APEE-DSR)
EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol
Reevaluating Audience Clustering in Sports Market utilizing Gossip Protocol
Path Id based Selective Emergency Message Forwarding Scheme for VANET
Execution Analysis of Wireless Sensor Network Localization Algorithms
Remote Sensor Network Surveillance on Forest Illegal Mining utilizing 'Arranged Behavior Abortion Tower': Analytical Modeling
Execution Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4
An Analysis of Processing Multimedia Data in Mobile Ad Hoc Networks
Centroid Based Localization Utilizing Artificial Bee Colony Algorithm
Two-Level Grid Access Control Model Based on Resource Performance and Request Priority
A Survey on Edge-Based Internet-of-Things
Powerlessness Exploitations Using Steganography in PDF Files
A Review of Static Malware Detection for Android Apps Permission Based on Deep Learning
EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network
An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation
Point and Scope:Vehicular Ad Hoc Network, Privacy in Vehicular Ad Hoc Network, Security in Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Privacy in Mobile Ad Hoc Network, Security in Mobile Ad Hoc Network, Future Generation Networks and its Applications, Wireless Sensor Network, Security in Wireless Sensor Network, Social Networks, Privacy in Social Networks, Security in Social Networks, Web Services, Web Service Architecture, Web Protocol, Privacy in Web Communication, Security in Web Services, Human-Web Interaction, Network Protocol, Security in Network Protocol, Intrusion Detection and Prevention, Worm Propagation and Detection, Malware, Authenticatio
Recurrence: IJCNA Publishes one volume with 6 issues for every year. (February, April, June, August, October, December)
Accommodation Deadline: There is no cutoff time for paper accommodation. Original copies can be submitted consistently.
DOI Prefix: 10.22247Google Scholar Citations of IJCNA
Note: Uses of computer in business
*IJCNA has no tie-up with an organization(s).
*IJCNA doesn't distribute meeting papers as customary or extraordinary issue.
*Acceptance got from "editor@ijcna.org" is just legitimate.
Most Viewed Most Recent Most Download
MNP: Malicious Node Prevention in Vehicular Ad hoc Networks
Huge Data Analysis for M2M Networks: Research Challenges and Open Research Issues
A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems
Use of Modified ACO Meta heuristic in Spray and Wait Routing
Assessment of the Effects of Measurement Interval on Artificial Neural Network-Based Prediction for Wireless Water Quality Monitoring Network
Portability Management Scheme Based on Smart Buffering for Vehicular Networks
A Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges
An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques
Examination of VBF convention in Underwater Sensor Network for Static and Moving Nodes
Improvement over AODV Considering QoS Support in Mobile Ad-hoc Networks
Assessment of TCP Congestion Control Modus Operandi in Mesh Networks
Investigating IOT Application Using Raspberry Pi
Availability Based Positioning System for Underground Vehicular Ad Hoc Networks
Plan and Security Simulation of Wi-Fi Networks
A Study of Machine Learning in Wireless Sensor Network
Execution Comparison among LTE and WiMAX Based on Link Level Simulation
Structure and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard
A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems
Structure and Implementation of a Smart Home for the Elderly and Disabled
Mama LEACH: Energy Efficient Routing Protocol for WSNs utilizing Particle Swarm Optimization and Mobile Aggregator
Use of Machine Learning for Intrusion Detection in a Network
A Survey of Various Security Issues in Online Social Networks
Improved Route Discovery Mechanism of Ad-Hoc On Demand Distance Vector for MANET
The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions
Machine-to-Machine Communications for Smart Homes
Vitality Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach
A Delay and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN
Self-Correcting Localization Scheme for Vehicle to Vehicle Communication
Plan of a Monitor for Detecting Money Laundering and Terrorist Financing
Improved Signcryption Algorithm for Information Security in Networks
A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing
A Probabilistic Key Management Protocol dependent on Kryptograph for WSN
Obstruction Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing
A Study on 5G Evolution and Revolution
Open Key Cryptography Techniques Evaluation
Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks
A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS
Organized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method
The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case
Remote Sensor Network-Based Health Monitoring System for the Elderly and Disabled
Productive Collaborative Technique utilizing Intrusion Detection System for Preserving Privacy in Location-based Services
A Study on Topology based Vehicular Ad hoc Network Routing Protocols
Upgraded Firewall with Traffic Awareness
Dynamic Node Recovery in MANET for High Recovery Probability
Security and Fraud Issues of E-banking
Programmed Feedback Framework for Deriving Educational Ontologies
Impact of Quarantine and Vaccination on Infectious Nodes in Computer Network
Security Concerns at Various Levels of Cloud Computing Paradigm: A Review
Time Based Fault Detection and Isolation In Wireless Sensors Network
A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks
A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks
Clone Attack Detection Using Pair Access Witness Selection Technique
Errand planning for Cloud Using Hybrid Cuckoo Algorithm
Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks
A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks
Versatile Routing Protocol dependent on Cuckoo Search calculation (ARP-CS) for made sure about Vehicular Ad hoc arrange (VANET)
Structure and Develop an Approach for Integrating Compression and Encryption on Textual Data
Digests Evaluation for Quality Assurance in Scientific Journal
IP Address Lookup in an IP Router Based On a Reorganized Binary Prefixes Value Tree (RBPVT)
Article Offer Supportive Review to Fresh Authors
Disclosure of Multi-Objective Overlapping Communities inside Social Networks utilizing a Socially Inspired Metaheuristic Algorithm
A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis
Structure and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks
Dispersed File Systems Implementation on an Edge Router utilizing GlusterFS for Cloud Applications
Blockage Aware Packet Routing For Delay Sensitive Cloud Communications
Execution Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks
A Novel Application based Generic Cluster Creation Mechanism in Ad Hoc Networks
Moderation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization
Vitality Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network
Usage of a Novel Protocol for Coordination of Nodes in Manet
Covering Community Detection in Social Networks Using Parliamentary Optimization Algorithm
A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP
TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
Similar Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System
A Framework for Effective Big information Analytics for Decision Support Systems
Security Enhancement in Shoulder Surfing Attacks utilizing Passpoints for Random Similar Images (PRSIm)
ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol
Virtualization and IoT Resource Management: A Survey
A Diffie-Hellman and Two Step Verification based Secure Cloud Computing Paradigm
Halfway Topology-Aware Data Distribution inside Large Unmanned Surface Vehicle Teams
Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review point of view
Literary Data Hiding in Digital Images Using Chaotic Maps
Framework and Cloud Computing Security: A Comparative Survey
Assessment of Optimum NPRACH Performance in NB-IoT Systems
QoS and Fuzzy Logic Based Routing Protocol for CRN
Versatile Power Transmission and Efficient Energy Scheme of DSR Protocol (APEE-DSR)
EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol
Reevaluating Audience Clustering in Sports Market utilizing Gossip Protocol
Path Id based Selective Emergency Message Forwarding Scheme for VANET
Execution Analysis of Wireless Sensor Network Localization Algorithms
Remote Sensor Network Surveillance on Forest Illegal Mining utilizing 'Arranged Behavior Abortion Tower': Analytical Modeling
Execution Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4
An Analysis of Processing Multimedia Data in Mobile Ad Hoc Networks
Centroid Based Localization Utilizing Artificial Bee Colony Algorithm
Two-Level Grid Access Control Model Based on Resource Performance and Request Priority
A Survey on Edge-Based Internet-of-Things
Powerlessness Exploitations Using Steganography in PDF Files
A Review of Static Malware Detection for Android Apps Permission Based on Deep Learning
EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network
An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation
Point and Scope:Vehicular Ad Hoc Network, Privacy in Vehicular Ad Hoc Network, Security in Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Privacy in Mobile Ad Hoc Network, Security in Mobile Ad Hoc Network, Future Generation Networks and its Applications, Wireless Sensor Network, Security in Wireless Sensor Network, Social Networks, Privacy in Social Networks, Security in Social Networks, Web Services, Web Service Architecture, Web Protocol, Privacy in Web Communication, Security in Web Services, Human-Web Interaction, Network Protocol, Security in Network Protocol, Intrusion Detection and Prevention, Worm Propagation and Detection, Malware, Authenticatio
No comments:
Post a Comment