Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2019

SUBMISSION
January 31, 2020

NOTIFICATION
February 29, 2020

PUBLICATION
March 31, 2020

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 324 = 6.423

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

IJCSS EDITORIAL BOARD MEMBER

Dr. Menaka Chellappan
Bharathiar University - India
Contact Details
Email - menu_mca_03@yahoo.co.in
No 201, Vrindhavan Apartment, Defence Layout, Vidyaranyapura, Bangalore-560097
India

ABOUT Dr. Menaka Chellappan

Ms. Menaka.C has completed Ph.D. from Bharathiar University, Coimbatore, Tamilnadu and MCA from Periyar University, Salem, Tamilnadu. She is a member of Computer society of India, Oracle Academy and ICT Academy. She is an Associate Editor of International Journal of Computer Engineering and Applications. Menaka has over 13 years of professional working experience and awarded with Best Research Scholar Award 2018 from DK International Research Foundation faculty awards 2018. She has participated, presented and published research papers in many International and National level journals. Her research interest includes Cloud Computing, Computer Security, Computer Networks, Cryptography, Communication & Data Security.

Dr. Menaka Chellappan handles review of manuscripts that are submitted under the following topics.

  • Communications and Data Security
  • Computer Security
  • Computer Networks
  • Cryptography
  • Authentication and Authorization models