Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2020

SUBMISSION
Septembet 30, 2020

NOTIFICATION
October 31, 2020

PUBLICATION
November 30, 2020

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS

ABOUT IJCSS

International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.

By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.

IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications

IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.

LIST OF TOPICS

Authentication and authorization models
Bioinformatics
Blockchain
Communications and data security
Computer Engineering
Computer graphics
Computer Networks
Computer security
Cryptography
Data mining
Databases
Electronic commerce
Human-Computer Interaction
Image processing
IoT & IIoT
Machine-to-Machine (M2M)
Object Orientation
Operating systems
Parallel and distributed processing
Programming languages
Robotics
Signal processing
Smart Sensors
Software engineering
Theory

PEER REVIEW PROCESS

   
IJCSS Peer-Review Process
Helpful Hints for Getting Published
 

CITATION ANALYSIS

In-process citations of IJCSS that are extracted through Google Scholar.

Total Citations = 2088
Self Citations = 5
Total Publications = 334


Citation Impact
(Total Citations - Self Citations) / Total Publications

Citation Impact
(2088 - 5) / 334 = 6.237

 
In-Process Citation Report for IJCSS
 

- Wide dissemination of publications

- International readership

- Qualitative Processes
(submission, review and publication)

- Pre / Post publication services

- Fast & timely publications

FIND MORE >>

 

ARTICLE PROCESSING CHARGES (APC)

- Low APC when compared with other publishers

- Full/Partial Waiver in APC to young scientists

FIND MORE >>

 

RANDOMLY SELECTED EDITOR

 
 
Professor Chen-Chi Shing
Radford University
United States of America
 
 
Dr. Riccardo Colella
University of Salento
Italy
 
VIEW IJCSS EDITORIAL BOARD
Join as Editor Reviewer or Author
 

PARTNERSHIP & COLLABORATION

IJCSS PUBLICATIONS

Universities, institutes & research centers.
 
UNITED STATES OF AMERICA
Mississippi State University
Sam Houston State University
UNITED KINGDOM
University of Birmingham
University of South Wales
AUSTRALIA
Australian National University
Microchip Technology Inc.
FRANCE
Université de Caen Normandie
Télécom ParisTech
MALAYSIA
Universiti Teknologi Malaysia (UTM)
University Putra Malaysia (UPM)
JAPAN
Saga University
Tokushima University
TAIWAN
National United University
Ming Chuan University
SAUDI ARABIA
Umm Al-Qura University
Taibah University
EGYPT
Cairo University
Mansoura University
JORDAN
Philadelphia University Amman
The Hashemite University
NIGERIA
Lagos State University
INDIA
Indian Institute of Technology (IIT)
 

RANDOMLY SELECTED PUBLICATIONS

Security, Privacy and Steganographic Analysis of FaceApp and TikTok  
  Ashar Neyaz, Avinash Kumar, Sundar Krishnan, Jessica Placker, Qingzhong Liu - United States of America  
  Volume-14 : Issue-2 : 2020   |   Full Text PDF
Application of Blockchain and Smart Contracts on the Internet of Things  
  Nicholas Lucci, Mohammed Ketel - United States of America  
  Volume-14 : Issue-2 : 2020   |   Full Text PDF
Joint Roughness and Wrinkle Detection Using Gabor Filtering and Dynamic Line Tracking  
  Elliot Naylor, Marius Miknis, Ross Davies - United Kingdom  
  Volume-13 : Issue-5 : 2019   |   Full Text PDF
Trusting Smart Speakers: Understanding the Different Levels of Trust between Technologies  
  Alec Wells, Aminu Bello Usman, Justin McKeown - United Kingdom  
  Volume-14 : Issue-2 : 2020   |   Full Text PDF
Software Architecture Erosion: Impacts, Causes, and Management  
  Sharon Andrews, Mark Sheppard - United States of America  
  Volume-14 : Issue-2 : 2020   |   Full Text PDF
A Survey On Solid-State Drive Forensic Analysis Techniques  
  Avinash Kumar, Ashar Neyaz, Narasimha Karpoor Shashidhar - United States of America  
  Volume-14 : Issue-2 : 2020   |   Full Text PDF
 

ABSTRACTING & INDEXING

Google Scholar
Academic Journals Database
ScientificCommons
SemanticScholar
Academia
Academic Index
CiteSeerX
OALib
BibSonomy
refSeek
TechRepublic
iSEEK
Socol@r
ResearchGate
Doc Player
Libsearch
Bielefeld Academic Search Engine (BASE)
OpenJ-Gate
Scribd
WorldCat
SlideShare
PdfSR
Google Books
NEW JOUR
The Collection of Computer Science Bibliographies
 
Refer to IJCSS Abstracting & Indexing for complete list of databases/websites.
 
 
RELATED JOURNALS
 
- International Journal of Security (IJS)
- International Journal of Computer Networks (IJCN)
- International Journal of Contemporary Advanced Mathematics (IJCM)
   
- Complete List of Journals
- Open Access Library

SUBSCRIBE IJCSS