Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 6   ISSUE - 1    
Publication Date - February 2012      |       Pages - 1 - 110
Download Complete Issue    (6.58MB)
   
     
     
     
10 Records found in CSC-OpenAccess Library.    
     
     
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages    
Mallikka Rajalingam, Salah Ali Alomari, Putra Sumari    
Pages - 1 - 18     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (1.51MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System    
Razi Hosseinkhani, Seyyed Hamid Haj Seyeed Javadi    
Pages - 19 - 28     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (734.13KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Recourse Management Using a Fair Share Scheduler    
Suja Cherukullapurath Mana    
Pages - 29 - 33     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (60.34KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols Based on Network Size for MANET    
Ritika , Nipur    
Pages - 34 - 42     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (917.98KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Semantic Massage Addressing based on Social Cloud Actor's Interests    
Reem M. Bahgat, Akram Ibrahim Salah, Hamada I. Abdul Wakeil    
Pages - 43 - 52     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (184.97KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Algorithem Algorithem and Programme for Computation of Forces Acting on line Supports    
Abdulaziz Salem Bahaidara    
Pages - 53 - 61     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (89.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Micro-Mobility Management Scheme for Handover and Roaming (RETRACTION PAPER)    
Debabala Swain, Siba Prasada Panigrahi, Prasanta Kumar Patra    
Pages - 62 - 78     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (1.75MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Audio Steganography Coding Using the Discreet Wavelet Transforms    
Siwar Rekik, Driss Guerchi, Habib Hamam, Sid-Ahmed Selouani    
Pages - 79 - 93     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (171.04KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
New Proposedclassic Cluster Layer Architecture for Mobile Adhoc Network (cclam)    
Kuldeep Sharma, Nikhil Khandelwal, Sanjeev Kumar Singh    
Pages - 94 - 102     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (179.9KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Quality and Distortion Evaluation of Audio Signal by Spectrum    
Er. Niranjan Singh, Dr. Bhupendra Verma    
Pages - 103 - 110     |    Revised - 15-01-2012     |    Published - 21-02-2012    
Full Text Available  (775.12KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles