Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2020

SUBMISSION
July 31, 2020

NOTIFICATION
August 31, 2020

PUBLICATION
September 30, 2020

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

ABOUT IJCSS

International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.

By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.

IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications

IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.

LIST OF TOPICS

Authentication and authorization models
Bioinformatics
Communications and data security
Computer Engineering
Computer graphics
Computer Networks
Computer security
Cryptography
Data mining
Databases
Electronic commerce
Image processing
Object Orientation
Operating systems
Parallel and distributed processing
Programming languages
Robotics
Signal processing
Software engineering
Theory

IJCSS PUBLICATIONS

Universities, institutes & research centers.
 
UNITED STATES OF AMERICA
Mississippi State University
Sam Houston State University
UNITED KINGDOM
University of Birmingham
University of South Wales
AUSTRALIA
Australian National University
Microchip Technology Inc.
FRANCE
UniversitÚ de Caen Normandie
TÚlÚcom ParisTech
MALAYSIA
Universiti Teknologi Malaysia (UTM)
University Putra Malaysia (UPM)
JAPAN
Saga University
Tokushima University
TAIWAN
National United University
Ming Chuan University
SAUDI ARABIA
Umm Al-Qura University
Taibah University
EGYPT
Cairo University
Mansoura University
JORDAN
Philadelphia University Amman
The Hashemite University
NIGERIA
Lagos State University
INDIA
Indian Institute of Technology (IIT)
 

RANDOMLY SELECTED PUBLICATIONS

Joint Roughness and Wrinkle Detection Using Gabor Filtering and Dynamic Line Tracking  
  Elliot Naylor, Marius Miknis, Ross Davies - United Kingdom  
  Volume-13 : Issue-5 : 2019   |   Full Text PDF
Image Steganography Techniques: An Overview  
  Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi - Malaysia  
  Volume-6 : Issue-3 : 2012   |   Full Text PDF
Security Key Management Model for Low Rate Wireless Personal Area Networks  
  Anass RGHIOUI, Said BOUCHKAREN , Anass KHANNOUS, Mohammed BOUHORMA - Morocco  
  Volume-8 : Issue-5 : 2014   |   Full Text PDF
Non-Specialized File Format Extension  
  Blake W. Ford, Khosrow Kaikhah - United States of America  
  Volume-5 : Issue-5 : 2011   |   Full Text PDF
Performance Review of Zero Copy Techniques  
  Jia Song, Jim Alves-Foss - United States of America  
  Volume-6 : Issue-4 : 2012   |   Full Text PDF
A Survey of Symbolic Execution Tools  
  Salahaldeen Duraibi, Abdullah Alashjaee, Jia Song - United States of America  
  Volume-13 : Issue-6 : 2019   |   Full Text PDF
Securing iClouds Storage Based On Combination of RSA and AES Crypto System  
  Badreldin O. S. Elgabbani, Emad Abdulrahman Shafie - Saudi Arabia  
  Volume-13 : Issue-5 : 2019   |   Full Text PDF
Design for A Network Centric Enterprise Forensic System  
  Hongye Zhong, Jitian Xiao - Australia  
  Volume-9 : Issue-4 : 2015   |   Full Text PDF
 

ABSTRACTING & INDEXING

Google Scholar
Academic Journals Database
ScientificCommons
SemanticScholar
Academia
Academic Index
CiteSeerX
OALib
BibSonomy
refSeek
TechRepublic
iSEEK
Socol@r
ResearchGate
Doc Player
Libsearch
Bielefeld Academic Search Engine (BASE)
OpenJ-Gate
Scribd
WorldCat
SlideShare
PdfSR
Google Books
NEW JOUR
The Collection of Computer Science Bibliographies
 
Refer to IJCSS Abstracting & Indexing for complete list of databases/websites.
 

PEER REVIEW PROCESS

   
IJCSS Peer-Review Process
Helpful Hints for Getting Published
 

CITATION ANALYSIS

In-process citations of IJCSS that are extracted through Google Scholar.

Total Citations = 2088
Self Citations = 5
Total Publications = 331


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2088 - 5) / 331 = 6.293

 
In-Process Citation Report for IJCSS
 

- Wide dissemination of publications

- International readership

- Qualitative Processes
(submission, review and publication)

- Pre / Post publication services

- Fast & timely publications

FIND MORE >>

 

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers

- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

RANDOMLY SELECTED EDITOR

 
 
Dr. Chen-Chi Shing
Radford University
United States of America
 
 
Dr. Riccardo Colella
University of Salento
Italy
 
VIEW IJCSS EDITORIAL BOARD
Join as Editor Reviewer or Author
 

PARTNERSHIP & COLLABORATION

SUBSCRIBE IJCSS