Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-11-25
Vol. 19, No. 11 has been published online!
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
Home
>
Published Issues
>
2013
>
Volume 8, No. 11, November 2013
>
Volume 8, No. 11, November 2013
Article#
Article Title & Authors (Volume 8, No. 11, November 2013)
Page
1
Hybrid and Blind Steganographic Method for Digital Images Based on DWT and Chaotic Map
Samer Atawneh and Putra Sumari
690
2
Honeypots Aiding Network Forensics: Challenges and Notions
Qassim Nasir and Zahraa A. Al-Mousa
700
3
Social Networks IM Forensics: Encryption Analysis
Nedaa B. Al Barghuthi and Huwida Said
708
4
Worm Detection without Knowledge Base in Industrial Networks
Huayang Cao, Jinjing Zhao, Peidong Zhu, Xicheng Lu, and Chonglun Zhao
716
5
Performance Analysis of Handover Strategy in Femtocell Network
Azita Laily Yusof, Siti Sabariah Salihin, Norsuzila Ya’acob, and Mohd Tarmizi Ali
724
6
Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem
R. Muthaiah, B. D. Deebak, K. Thenmozhi, and P. Swaminathan
730
7
Tampered Data Recovery in WSNs through Dynamic PCA and Variable Routing Strategies
Roberto Magán-Carrión, Fernando Pulido-Pulido, José Camacho, and Pedro García-Teodoro
738
8
Joint Mode Selection and Resource Allocation Using Evolutionary Algorithm for Device-to-Device Communication Underlaying Cellular Networks
Huifang Pang, Ping Wang, Xinhong Wang, Fuqiang Liu, and Nguyen Ngoc Van
751
9
On Covert Acoustical Mesh Networks in Air
Michael Hanspach and Michael Goetz
758
10
A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks
Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, and Liang Hu
768
11
Integrating Cancellable Biometrics with Geographical Location for Effective Unattended Authentication of Users of Mobile Devices
Hisham Al-Assam, Ihsan A. Lami, and Torben Kuseler
780
12
On Detection for Scarcely Collided Super-Slow Port Scannings in IDSs' Log-Data
Kazuyoshi Furukawa, Satoru Shimizu, Masahiko Takenaka, and Satoru Toriil
788
13
Establishing and Fixing Security Protocols Weaknesses Using a Logic-based Verification Tool
Anca D. Jurcut, Tom Coffey, and Reiner Dojen
795