Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

ABOUT IJCSS

International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.

By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.

IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications

IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.

LIST OF TOPICS

Authentication and authorization models
Bioinformatics
Communications and data security
Computer Engineering
Computer graphics
Computer Networks
Computer security
Cryptography
Data mining
Databases
Electronic commerce
Image processing
Object Orientation
Operating systems
Parallel and distributed processing
Programming languages
Robotics
Signal processing
Software engineering
Theory

PEER REVIEW PROCESS

   
IJCSS Peer-Review Process
Helpful Hints for Getting Published
 

CITATION ANALYSIS

In-process citations of IJCSS that are extracted through Google Scholar.

Total Citations = 2086
Self Citations = 5
Total Publications = 300


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2086 - 5) / 300 = 6.937

 
In-Process Citation Report for IJCSS
 

- Wide dissemination of publications

- International readership

- Qualitative Processes
(submission, review and publication)

- Pre / Post publication services

- Fast & timely publications

FIND MORE >>

 

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers

- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

RANDOMLY SELECTED EDITOR

 
 
Dr. Riccardo Colella
University of Salento
Italy
 
 
Dr. Anissa BOUZALMAT
Sidi Mohamed Ben Abdellah University
Morocco
 
VIEW IJCSS EDITORIAL BOARD
Join as Editor Reviewer or Author
 

PARTNERSHIP & COLLABORATION

SUBSCRIBE IJCSS

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
CiteSeerX
refSeek
TechRepublic
iSEEK
Socol@r
ResearchGate
Doc Player
Libsearch
Bielefeld Academic Search Engine (BASE)
OpenJ-Gate
Scribd
WorldCat
slideshare
PdfSR
Google Books
NEW JOUR
The Collection of Computer Science Bibliographies
Electronic Journals Library
Ulrich's Periodicals Directory
 
Refer to IJCSS Abstracting & Indexing for complete list of databases/websites.
 
 
RANDOMLY SELECTED PUBLICATIONS
Performance Review of Zero Copy Techniques
  Jia Song, Jim Alves-Foss - University of Idaho - United States of America
  IJCSS, Volume-6 : Issue-4 : 2012   |   Cites (4)   |   Full Text PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
  H S Manjunatha Reddy, K B Raja - University of Idaho - United States of America
  IJCSS, Volume-3 : Issue-6 : 2009   |   Cites (53)   |   Full Text PDF
Image Steganography Techniques: An Overview
  Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi - University Malaysia Perlis - Malaysia
  IJCSS, Volume-6 : Issue-3 : 2012   |   Cites (80)   |   Full Text PDF
Different Types of Attacks on Integrated MANET-Internet Communication
  Abhay Kumar Rai, Rajiv Ranjan Tewari, Saurabh Kant Upadhyay - University of Allahabad - India
  IJCSS, Volume-4 : Issue-3 : 2010   |   Cites (106)   |   Full Text PDF
An Ant Algorithm for Solving QoS Multicast Routing Problem
  Ahmed Younes Hamed - University of Allahabad - India
  IJCSS, Volume-5 : Issue-1 : 2011   |   Cites (3)   |   Full Text PDF
Design for A Network Centric Enterprise Forensic System
  Hongye Zhong, Jitian Xiao - School of Computer and Security Science Edith Cowan University WA 6050 - Australia
  IJCSS, Volume-9 : Issue-4 : 2015   |   Cites (0)   |   Full Text PDF
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks
  David Fotue, Houda Labiod, Thomas Engel - University of Luxembourg - Luxembourg
  IJCSS, Volume-6 : Issue-3 : 2012   |   Cites (1)   |   Full Text PDF
Security Key Management Model for Low Rate Wireless Personal Area Networks
  Anass RGHIOUI, Said BOUCHKAREN , Anass KHANNOUS, Mohammed BOUHORMA - Faculty of Science and Technology of Tangier - Morocco
  IJCSS, Volume-8 : Issue-5 : 2014   |   Cites (0)   |   Full Text PDF