Journal of Computing and Security


Cover-shade

JCS is an openly accessible and peer-reviewed journal

Editor in Chief: Dr. Ahmad Reza Naghsh Nilchi

Managing Editor: Dr. Behrouz Tork Ladani

ISSN Print: 2322-4460

ISSN Online: 2383-0417

Website: http://www.jcomsec.org

paste6

Paper Submission

 

 

Journal of Computing and Security (JCS) is a peer-reviewed, scientific journal that is committed to publication of original results in all areas of modern computing as well as information security. We are pleased to invite you to submit your original article(s), which is neither previously published nor under consideration for review or publication elsewhere. The notification of acceptance is sent in at most four months period from the date of submission to expedite the publication process. The published issues are in English and distributed worldwide in open access fashion.

 

Aims and Scope

JCS is dedicated to the publication of quality research papers in the area of information technology and computer science and engineering with the focus on the following topics:

Modern Computing

Information Security

Algorithms

Artificial Intelligence

Computer Graphics and Multimedia

Computer Modeling and Simulation

Computer Networks

Data Mining

Databases and Semantic Web

Digital Image and Speech Processing

e-Business and Internet Applications

Formal Methods

Hardware Design and Simulation

High Performance Computing and Distributed Systems

Intelligent Robotics

Neural Networks and Fuzzy logic

Pattern Recognition

Software Engineering

Symbolic Computation

Theory of Computing

Wireless Communications and Ad Hoc Networks

Authentication and Access Control

Cryptanalysis

Cryptographic Algorithms

Formal and Provable Security Analysis

Information Warfare and Survivability

Internet Applications Security

Intrusion Detection

Mathematics of Cryptology

Network and Communication Security

OS and Database Security

Privacy and Anonymity

Security in Pervasive Computing

Security Protocols

Software Security

Steganography and Watermarking

Trust Modeling

Vulnerability and Risk Management

Paper Submission

To expedite the publication process and reduce the formatting related tasks for our contributors, the initial submitted papers could be in word or PDF formats. Authors may also use IEEE, Springer or ACM templates. Paper(s) must, however, be written in English. For submission, you should first register in the editorial system from here. I you have already registered please login and then select the new submission link.

Contact Info

Website: http://www.jcomsec.org

Email: info@jcomsec.org

Tel: +98 311 7934558+98 31 37934558

Fax: +98 31 37932670



Vol 3, No 2 (2016): April 2016

Table of Contents

Peer-reviewed Articles

An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing PDF PERSIAN_ABS
Hadi Halvachi, Mohammad Ali Hadavi, Rasool Jalili
A Hybrid Method based on Statistical Features and Packet Content Analysis to Identify Major Network Tunneling Protocols PDF PERSIAN_ABS
Keihan Kazemi, Ali Fanian
The Diagnosis of Epilepsy by Gravitational Search Algorithm and Support Vector Machines PDF PERSIAN_ABS
Zeinab Basereh, Shahram Golzari, Abbas Harifi
AUBUE: An Adaptive User-Interface Based on Users' Emotions PDF PERSIAN_ABS
Fariba Noori, Mohammad Kazemifard


ISSN: 2383-0417