Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 6   ISSUE - 4    
Publication Date - August 2012      |       Pages - 203 - 294
Download Complete Issue    (6.3MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
Data Security In Relational Database Management System    
R.Balasubramaniam    
Pages - 203 - 210     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (606.66KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia    
Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Hj Mohd Noor, Muhamad Arif Hashim    
Pages - 211 - 225     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (2.14MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment    
Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad    
Pages - 226 - 237     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (350.69KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Software Design Level Vulnerability Classification Model    
Shabana Rehman, Khurram Mustafa    
Pages - 238 - 255     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (494.59KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Performance Review of Zero Copy Techniques    
Jia Song, Jim Alves-Foss    
Pages - 256 - 268     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (453.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Flow Modeling Based Wall Element Technique    
Sabah Tamimi    
Pages - 269 - 276     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (1.86MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones    
Torben Kuseler, Ihsan Alshahib Lami    
Pages - 277 - 287     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (157.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Comparative Analysis of Algorithms for Single Source Shortest Path Problem    
Shweta Srivastava    
Pages - 288 - 294     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (107.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles