Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 4   ISSUE - 4    
Publication Date - October 2010      |       Pages - 373 -435
Download Complete Issue    (2.76MB)
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
Deploying E-Mail as an Official Communication Tool: Technical Prospect    
wasan shaker awad    
Pages - 373 - 384     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (105.25KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
A Lower Bound Study on Software Development Effort    
Lung-Lung Liu    
Pages - 383 - 391     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (142.13KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Steganography using Dictionary Sort on Vector Quantized Codebook    
H.B.Kekre, Archana Athawale, Tanuja Sarode, Sudeep Thepade, Kalpana Sagvekar    
Pages - 392 - 402     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (414.29KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Cutting Edge Practices for Secure Software Engineering    
Kanchan Hans    
Pages - 403 - 408     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (135.58KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture using Parallel Jacobian Coordinate System    
Adnan Abdul-Aziz Gutub    
Pages - 409 - 425     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (199.66KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Automated Detection System for SQL Injection Attacks    
K.V.N.Sunitha, M. Sridevi    
Pages - 426 - 435     |    Revised - 30-08-2010     |    Published - 30-10-2010    
Full Text Available  (460.12KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles