Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 4   ISSUE - 6    
Publication Date - January / February      |       Pages - 497 -610
Download Complete Issue    (4.93MB)
   
     
     
     
10 Records found in CSC-OpenAccess Library.    
     
     
Anomaly Detection of IP Header Threats    
S. H. C. Haris, Ghossoon Mohammed Waleed Al-Saadoon, Asso. Prof. Dr. R. B. Ahmad, M. A. H. A. Ghani    
Pages - 497 - 504     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (564.6KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Security Analysis Framework Powered by an Expert System    
Maher Mohamed Gamal, Bahaa Hassan, Abdel Fatah Hegazy    
Pages - 505 - 527     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (500.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network with Node Failure    
Ahmed younes Hamed, Moatamad Refaat Hassan    
Pages - 528 - 536     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (90.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
DDoS Protections for SMTP Servers    
Michael Still, Eric Charles McCreath    
Pages - 537 - 550     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (398.71KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network    
Virendra Singh Kushwah, Gaurav Sharma    
Pages - 551 - 560     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (306.96KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding    
Debasree Sarkar, Amitava Nag, Sushanta Biswas, Partha Pratim Sarkar    
Pages - 561 - 570     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (1.88MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Performance Comparison of Automatic Speaker Recognition using Vector Quantization by LBG KFCG and KMCG    
Dr. H B Kekre, Vaishali Kulkarni    
Pages - 571 - 579     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (374.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distributed Wireless Sensor Networks    
Muktikanta Sa, Manas Ranjan Nayak, Smiya Kumar Rath    
Pages - 580 - 588     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (96.97KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A New System for Clustering and Classification of Intrusion Detection System Alerts Using Self-Organizing Maps    
Amir Azimi Alasti Ahrabi, Ahmad Habibizad Navin, Hadi Bahrbegi, Mir Kamal Mirnia, Mehdi Bahrbegi, Elnaz Safarzadeh, Ali Ebrahimi    
Pages - 589 - 597     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (439.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Enhanced Mobile IP Handover Using Link Layer Information    
Mohamed Alnas, Mahmud Mansour    
Pages - 598 - 610     |    Revised - 31-01-2011     |    Published - 08-02-2011    
Full Text Available  (127.25KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles