Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 2   ISSUE - 4    
Publication Date - August 2008      |       Pages - 1 - 42
Download Complete Issue    (1016.41KB)
   
     
     
     
4 Records found in CSC-OpenAccess Library.    
     
     
On Reliability Analysis of Fault-tolerant Multistage Interconnection Networks    
Rinkle Aggarwal, Lakhwinder Kaur    
Pages - 1 - 8     |    Revised - 15-8-2008     |    Published - 15-11-2008    
Full Text Available  (102.96KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Context Transfer Approach to Enhance Mobile Multicast    
Aisha-Hassan A. Hashim, Abdi Nasir Ahmed, Abdulrehman Bin Mahfouz, Sheroz Khan    
Pages - 9 - 17     |    Revised - 15-8-2008     |    Published - 15-11-2008    
Full Text Available  (179.43KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Vertical Search Engine - Based on Domain Classifier    
Rajashree Shettar, Rahul Bhuptani    
Pages - 18 - 27     |    Revised - 15-8-2008     |    Published - 15-11-2008    
Full Text Available  (433.35KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Hierarchies in Contextual Role- Based Access Control Model (C-RBAC)    
Muhammad Nabeel Tahir    
Pages - 28 - 42     |    Revised - 15-8-2008     |    Published - 15-11-2008    
Full Text Available  (137.3KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles