Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 4   ISSUE - 2    
Publication Date - May 2010      |       Pages - 149 -264
Download Complete Issue    (4.92MB)
   
     
     
     
9 Records found in CSC-OpenAccess Library.    
     
     
Parallel Computing in Chemical Reaction Metaphor with Tuple Space    
Hong Lin, Jeremy Kemp, Wilfredo Molina    
Pages - 149 - 159     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (274.92KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Data Mining Algorithm for Semantic Web Based Data Cloud    
N.C.Mahanti, kanhaiya lal    
Pages - 160 - 175     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (729.23KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Document Topic Generation in Text Mining by using Cluster Analysis with EROCK    
Rizwan Ahmad, Aasia Khanum    
Pages - 176 - 182     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (402.98KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Heuristics Based Genetic Algorithm for Scheduling Static Tasks in Homogeneous Parallel System    
Kamaljit Kaur, Amit Chhabra, Gurvinder Singh    
Pages - 183 - 198     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (271.89KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Knowledge Discovery from Students’ Result Repository: Association Rule Mining Approach    
Olanrewaju Jelili Oyelade, Oladipupo, Olufunke Oyejoke    
Pages - 199 - 207     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (879.63KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Multilevel Access Control in a MANET for a Defense Messaging System using Elliptic Curve Cryptography    
J. Nafeesa Begum, K.Kumar, V.Sumathy    
Pages - 208 - 225     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (457.24KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
FPGA Prototype of Robust Image Watermarking for JPEG 2000 with Dual Detection    
Pankaj U.Lande, Sanjay N. Talbar, G.N. Shinde    
Pages - 226 - 236     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (912.52KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Comparing The Proof By Knowledge Authentication Techniques    
Stamati Gkarafli , Anastasios A. Economides    
Pages - 237 - 255     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (677.95KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Development of Information Agent Reranking By using Weights Measurement    
Aliaa A.Youssif, Ashraf A. Darwish, Ahmed Roshdy    
Pages - 256 - 264     |    Revised - 30-04-2010     |    Published - 10-06-2010    
Full Text Available  (242.5KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles