Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 2   ISSUE - 1    
Publication Date - February 2008      |       Pages - 1 - 86
Download Complete Issue    (1.35MB)
   
     
     
     
7 Records found in CSC-OpenAccess Library.    
     
     
A Survey on MANET Intrusion Detection    
Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah    
Pages - 1 - 11     |    Revised - 15-08-2007     |    Published - 30-08-2007    
Full Text Available  (168.83KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Implementation of Radial Basis Function Neural Network for Image Steganalysis    
Sambasiva Rao Baragada, S. Ramakrishna, M.S. Rao, S. Purushothaman    
Pages - 12 - 22     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (306.23KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Segmentation of Malay Syllables in Connected Digit Speech Using Statistical Approach    
M-S Salam, Dzulkifli Mohamad, S-H Salleh    
Pages - 23 - 33     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (147.54KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
GPS-less Localization Protocol for Underwater Acoustic Networks    
A.K. Othman    
Pages - 34 - 48     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (452.63KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Detecting and Preventing Attacks Using Network Intrusion Detection Systems    
Meera Gandhi, S.K.Srivatsa    
Pages - 49 - 60     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (226.55KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
RB-GDM: A Role-Based Grid Delegation Model    
G Geethakumari, Atul Negi, V N Sastry    
Pages - 61 - 72     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (321.18KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Implementation of Echostate Network in NIDS    
Meera Gandhi, S.K. Srivatsa    
Pages - 73 - 86     |    Revised - 15-02-2008     |    Published - 30-02-2008    
Full Text Available  (125.16KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles