Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
Chen-Chi Shing (Radford University - United States of America)
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2017
Published by CSC Journals, Kuala Lumpur Malaysia.

ISSUE MANUSCRIPTS

VOLUME - 6   ISSUE - 4    
Publication Date - August 2012      |       Pages - 203 - 294
Download Complete Issue    (6.3MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
Data Security In Relational Database Management System    
R.Balasubramaniam    
Pages - 203 - 210     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (606.66KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia    
Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Hj Mohd Noor, Muhamad Arif Hashim    
Pages - 211 - 225     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (2.14MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment    
Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad    
Pages - 226 - 237     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (350.69KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Software Design Level Vulnerability Classification Model    
Shabana Rehman, Khurram Mustafa    
Pages - 238 - 255     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (494.59KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Performance Review of Zero Copy Techniques    
Jia Song, Jim Alves-Foss    
Pages - 256 - 268     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (453.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Flow Modeling Based Wall Element Technique    
Sabah Tamimi    
Pages - 269 - 276     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (1.86MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones    
Torben Kuseler, Ihsan Alshahib Lami    
Pages - 277 - 287     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (157.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Comparative Analysis of Algorithms for Single Source Shortest Path Problem    
Shweta Srivastava    
Pages - 288 - 294     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (107.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles