Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 9   ISSUE - 2    
Publication Date - March / April 2015      |       Pages - 11 - 131
Download Complete Issue    (6.02MB)
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues    
Archana Sharma, Vineet Kansal, R. P. S. Tomar    
Pages - 11 - 21     |    Revised - 01-03-2015     |    Published - 31-03-2015    
Full Text Available  (373.63KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
The Principles of Modern Attacks Analysis for Penetration Tester    
Adam Ali.Zare Hudaib    
Pages - 22 - 84     |    Revised - 01-03-2015     |    Published - 31-03-2015    
Full Text Available  (704.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website    
Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah    
Pages - 85 - 95     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (571.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Enhancing Pixel Value Difference (PVD) Image Steganography by Using Mobile Phone Keypad (MPK) Coding    
Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara    
Pages - 96 - 107     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (2.68MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Measuring Information Security: Understanding And Selecting Appropriate Metrics    
Perpétus Jacques Houngbo , Joël Toyigbé Hounsou    
Pages - 108 - 120     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (105.2KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Image Processing Technique To Detect Fish Disease    
Hitesh Chakravorty, Rituraj Paul, Prodipto Das    
Pages - 121 - 131     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (1.18MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles