Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
Chen-Chi Shing (Radford University - United States of America)
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018
Published by CSC Journals, Kuala Lumpur Malaysia.

ISSUE MANUSCRIPTS

VOLUME - 5   ISSUE - 5    
Publication Date - November / December 2011      |       Pages - 425 - 526
Download Complete Issue    (4.17MB)
   
     
     
     
10 Records found in CSC-OpenAccess Library.    
     
     
Non-Specialized File Format Extension    
Blake W. Ford, Khosrow Kaikhah    
Pages - 425 - 432     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (65.01KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images    
Priyanka Singh, Priti Singh    
Pages - 433 - 442     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (180.47KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks    
Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi    
Pages - 443 - 455     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (252.27KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding    
P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini    
Pages - 456 - 468     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (383.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
A Novel Steganography Technique that Embeds Security along with Compression    
Anuradaha, Nidhi Sharma, Rimple gilhotra    
Pages - 469 - 476     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (63.87KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Phishing Website Detection Using Particle Swarm Optimization    
Radha Damodaram , M.L.Valarmathi    
Pages - 477 - 490     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (441.46KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Maintenance of Network Connectivity Across Process Migration    
Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi, Elnaz Safarzadeh    
Pages - 491 - 495     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (49.57KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Detection of Botnets using Honeypots and P2P Botnets    
Rajab Challoo, Raghavendra Kotapalli    
Pages - 496 - 502     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (129.45KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets    
B.K. Raghavendra, S.K. Srivatsa    
Pages - 503 - 511     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (123.73KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Dynamic Audio-Visual Client Recognition modelling    
Tijjani Adam Shuwa, U. Hashim    
Pages - 512 - 526     |    Revised - 01-11-2011     |    Published - 15-12-2011    
Full Text Available  (2.19MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles