Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 3   ISSUE - 1    
Publication Date - February 2009      |       Pages - 1 - 75
Download Complete Issue    (2.63MB)
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching    
Waleed Ali Ahmed, Siti Mariyam Shamsuddin    
Pages - 1 - 15     |    Revised - 20-02-2009     |    Published - 15-03-2009    
Full Text Available  (671.68KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network    
Rajender Nath , Pankaj Kumar Sehgal    
Pages - 16 - 22     |    Revised - 20-03-2009     |    Published - 15-03-2009    
Full Text Available  (82.85KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
MMI Diversity Based Text Summarization    
Mohammed Salem Binwahlan, Naomie Salim , Ladda Suanmali    
Pages - 23 - 33     |    Revised - 20-03-2009     |    Published - 15-03-2009    
Full Text Available  (145.7KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Asking Users: A Continuous Evaluation on Systems in a Controlled Environment    
Suziah Sulaiman, Dayang Rohaya Awang Rambli, Wan Fatimah Wan Ahmad, Halabi Hasbullah, Foong Oi Mean, M Nordin Zakaria, Goh Kim Nee, Siti Rokhmah M Shukri    
Pages - 34 - 42     |    Revised - 20-02-2009     |    Published - 15-03-2009    
Full Text Available  (109.24KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Exploring Knowledge for a Common Man through Mobile Services and Knowledge Discovery in Databases    
Mayank Dave, S. B. Singh, Sanjeev Manchanda    
Pages - 43 - 61     |    Revised - 20-02-2009     |    Published - 15-03-2009    
Full Text Available  (1.19MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Testing of Contextual Role-Based Access Control Model (C-RBAC)    
Muhammad Nabeel Tahir    
Pages - 62 - 75     |    Revised - 20-02-2009     |    Published - 15-03-2009    
Full Text Available  (315.88KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles