Submissions

Login or Register to make a submission.

Author Guidelines

Overview

IJCCN publishes peer-reviewed research on computer communications, networking, protocol design, distributed connectivity, network security, and resilient communication systems.

Manuscript Requirements

  • Manuscripts must be written in English.
  • Provide a 50 to 150 word abstract and 4 to 6 keywords.
  • Use the journal manuscript template and keep the paper within a recommended maximum of 10 double-column pages.
  • Figures, topology diagrams, tables, and references must be complete and clearly labeled.
  • Submit the manuscript in Word, RTF, or PDF. The editorial office may request an editable source file after acceptance.

Submission and Review Flow

  1. Prepare the manuscript using the IJCCN template.
  2. Ensure the file is anonymized if the selected section requires blind review.
  3. Submit through the journal submission workflow in OJS.
  4. Editorial screening checks scope, formatting, originality, and completeness.
  5. Eligible manuscripts are reviewed by at least two independent reviewers.
  6. Revisions, the signed copyright form, and publication fee processing are completed only after acceptance.

Required Downloads

Journal-Specific Expectations

  • Identify topology, assumptions, datasets, baselines, and evaluation metrics clearly.
  • Report communication performance, security implications, and implementation constraints.
  • Include responsible disclosure context when vulnerabilities or offensive testing are involved.

Publication Fee

USD 80 is charged only for accepted papers. No submission fee is charged.

Submission Preparation Checklist

All submissions must meet the following requirements.

  • The manuscript is original, has not been published previously, and is not under review elsewhere.
  • The submission file is in Word, RTF, or PDF format and follows the journal template referenced in the Author Guidelines.
  • The manuscript includes title, abstract, keywords, main text, references, and any required statements on funding, conflicts of interest, and data or code availability.
  • Network diagrams, tables, datasets, and experimental settings are cited in the text and provided clearly.
  • Topology, protocol settings, baselines, and evaluation metrics are reported in sufficient detail.
  • Where security testing is involved, the work confirms lawful authorization and responsible handling of sensitive findings.
  • Blind-review instructions have been followed where required.

Privacy Statement

The names, affiliations, and email addresses entered in this journal site will be used only for editorial processing, peer review administration, publication, indexing, archiving, and communication related to this journal. They will not be used for unrelated purposes or shared with third parties except where required for publication, indexing, archiving, payment processing, or secure system administration.