Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 1   ISSUE - 1    
Publication Date - June 2007      |       Pages - 1 - 96
Download Complete Issue    (1.56MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems.    
Amit Chhabra, Gurvinder Singh    
Pages - 1 - 10     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (109.78KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Secure Key Agreement Protocol using Trusted Third Party.    
Sairam Kulkarni, Debashih Jena, Sanjay Kumar Jena    
Pages - 11 - 18     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (102.34KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Active Contours Without Edges and Curvature Analysis for Endoscopic Image Classification.    
B.V.Dhandra, Ravindra Hegadi    
Pages - 19 - 32     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (376.95KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Simple Encryption/Decryption Application.    
Majdi Al-qdah, Lin Yi Hui    
Pages - 33 - 40     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (73.82KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Morphological Reconstruction for Word Level Script Identification.    
B. V. Dhandra, Mallikarjun Hangarge    
Pages - 41 - 51     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (164.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Review Paper on Ad Hoc Network Security.    
Karan Singh, Rama Shankar Yadav, Ranvijay    
Pages - 52 - 69     |    Revised - 15-06-2007     |    Published - 30-05-2007    
Full Text Available  (298.58KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Review of Studies On Machine Learning Techniques.    
Yogesh Singh, Pradeep Kumar Bhatia, Omprakash Sangwan    
Pages - 70 - 84     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (156.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Texting Satisfaction: Does Age and Gender Make a Difference?    
Vimala Balakrishnan, Paul H. P. Yeow    
Pages - 85 - 96     |    Revised - 15-06-2007     |    Published - 30-06-2007    
Full Text Available  (107.12KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles