Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS

 

ABSTRACTING & INDEXING

   
Academia
Academic Index
Academic Journals Database
BibSonomy
Bielefeld Academic Search Engine (BASE)
CiteSeerX
Doc Player
Google Books
Google Scholar
iSEEK
J-Gate
Libsearch
OALib
PdfSR
refSeek
ResearchGate
Refer to IJCSS Abstracting & Indexing for complete list of databases/websites.
 
 

ABOUT IJCSS

International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.

By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.

IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications

IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.
 
CREATE AUTHOR ACCOUNT
 
Complete List of Journals >>
View all Special Issues >>
LAUNCH YOUR SPECIAL ISSUE
 
PUBLICATION VIDEOS
 
 

IJCSS PUBLICATIONS

 
Universities, institutes & research centers.
 
 
 
UNITED STATES OF AMERICA
Mississippi State University
University of Idaho
Sam Houston State University
UNITED KINGDOM
University of Birmingham
University of South Wales
AUSTRALIA
Australian National University
Microchip Technology Inc.
FRANCE
Université de Caen Normandie
Télécom ParisTech
MALAYSIA
Universiti Teknologi Malaysia (UTM)
University Putra Malaysia (UPM)
JAPAN
Saga University
Tokushima University
TAIWAN
National United University
Ming Chuan University
SAUDI ARABIA
Umm Al-Qura University
Taibah University
EGYPT
Cairo University
Mansoura University
JORDAN
Philadelphia University Amman
The Hashemite University
NIGERIA
Lagos State University
       

RANDOMLY SELECTED PAPERS

A Method of Constructing Balanced Repeated Measurement Designs for First Order Residual Effects in Information Security
  Chen-Chi Shing, Lee-Hur Shing
  School of Computer Science and Information Systems, Radford University, Radford, VA 24142 - United States of America
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis
  Niki Patel, Yanyan Li, Ahmad Reza Hadaegh
  Computer Science and Information System, California State University San Marcos, San Marcos, 92096 - United States of America
Session Initiation Protocol: Security Issues Overview
  Bruno Cruz, Rui Filipe Pereira
  Department of Informatics Engineering, Coimbra University, Coimbra - Portugal
Software Architecture Erosion: Impacts, Causes, and Management
  Sharon Andrews, Mark Sheppard
  Software Engineering, University of Houston Clear Lake, Houston, TX 77058 - United States of America
Design and Implementation of a Predictive Model for Nigeria Local Football League
  ADEBISI John, ALABI Damilola
  Engineering/Computer, University of Namibia, Ongwediva - Namibia
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques
  Eric Brown, Mohammed Ketel
  Applied Information Technology, University of Baltimore, Baltimore, Maryland - United States of America
A Systematic Review of Android Malware Detection Techniques
  Faris Auid Alharbi, Abdurhman Mansour Alghamdi, Ahmed S Alghamdi
  Faculty of Computer Science and Engineering/Cybersecurity, University of Jeddah, Jeddah, 23468, P.O.Box: 4053 - Saudi Arabia
 

PEER REVIEW PROCESS

   
IJCSS Peer-Review Process
Helpful Hints for Getting Published
Publishing Ethics

IJCSS AWARDS

An annual acknowledgement to authors and reviewers for their outstanding contributions to IJCSS. FIND MORE >>
SEE ALL VIDEOS >>

CITATION ANALYSIS

In-process citations of IJCSS that are extracted through Google Scholar.

Total Citations = 2088
Self Citations = 5
Total Publications = 366

Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact = 5.691

In-Process Citation Report of IJCSS.
 

- Wide dissemination of publications
- International readership
- Qualitative Processes
- Pre / Post publication services
- Fast & timely publications

FIND MORE >>

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers
- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

IJCSS PARTNERSHIPS & COLLABORATIONS

 
 

EDITOR-IN-CHIEF (EiC)

 
 
Professor Chen-Chi Shing
Radford University - United States of America
Email - cshing@radfoard.edu
 
 

RANDOMLY SELECTED EDITORS

 
 
Dr. Miaomiao Zhang
Manhattan College
United States of America
 
Mr. Rajasekhar Chaganti
Expediagroup Inc
United States of America
 
Associate Professor Fahri Ă–zsungur
Mersin University
Turkey
VIEW IJCSS EDITORIAL BOARD
Join as Editor Reviewer or Author

SUBSCRIBE IJCSS