Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2018

SUBMISSION
December 31, 2018

NOTIFICATION
January 31, 2019

PUBLICATION
February 28, 2019

HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Current Issue   Issues Archive   Submission Guidelines   Subscribe IJCSS

CITATION ANALYSIS

IJCSS Citation Impact
(2086 - 5) / 300 = 6.937

Refer to Citation Report for 2018 for complete details.
 

ABSTRACTING & INDEXING

 
Google Scholar
Academic Journals Database
ScientificCommons
Academia
Academic Index
 
FIND MORE
 

OPEN ACCESS LIBRARY

 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 9   ISSUE - 5    
Publication Date - September / October 2015      |       Pages - 225 - 279
Download Complete Issue    (1.59MB)
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
A Mitigation Technique For Internet Security Threat of Toolkits Attack    
Francisca Nonyelum Ogwueleka, Edward Onyebueke Agu    
Pages - 225 - 237     |    Revised - 31-08-2015     |    Published - 30-09-2015    
Full Text Available  (237.86KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
OpenGL Based Testing Tool Architecture for Exascale Computing    
Muhammad Usman Ashraf, Fathy Elbouraey Eassa    
Pages - 238 - 244     |    Revised - 31-08-2015     |    Published - 30-09-2015    
Full Text Available  (298.65KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Hybrid Model Based Testing Tool Architecture for Exascale Computing System    
Muhammad Usman Ashraf, Fathy Elbouraey Eassa    
Pages - 245 - 252     |    Revised - 31-08-2015     |    Published - 30-09-2015    
Full Text Available  (167.43KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Expression Data    
Dwitiya Tyagi-Tiwari, Sujoy Das, Manoj Jha, Namita Srivastava    
Pages - 253 - 265     |    Revised - 31-08-2015     |    Published - 30-09-2015    
Full Text Available  (162.49KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
Managing Intrusion Detection Alerts Using Support Vector Machines    
Majid Ghonji Feshki, Omid Sojoodi, Minoo Deljavan Anvary    
Pages - 266 - 273     |    Revised - 30-09-2015     |    Published - 31-10-2015    
Full Text Available  (119.81KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
     
A Review of Feature Model Position in the Software Product Line and Its Extraction Methods    
Saba Pedram, Mehran Mohsenzadeh, Amir Azimi Alasti Ahrabi    
Pages - 274 - 279     |    Revised - 30-09-2015     |    Published - 31-10-2015    
Full Text Available  (61.87KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles