Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2025

SUBMISSION
September 30, 2025

NOTIFICATION
October 15, 2025

PUBLICATION
October 31, 2025

ARTICLE PROCESSING CHARGES (APC)
TIER#1: $150   |   TIER#2: $100.   See more details.
    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.482

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

CURRENT ISSUE

VOLUME - 19   ISSUE - 4    
Publication Date - August 2025      |       Pages - 109 - 145    
     
     
     
3 Records found in CSC-OpenAccess Library.    
     
     
Comparative Study of Traditional Image Processing and Deep Learning Methods for Tamper Detection in Nigerian University Student Identity Cards    
Opeoluwa Omotayo Ajilore, Adewole A. Philip, Olumoye O. Mosud, Eludire A. Adekunle, Akanni W. Adeniyi, Adegunwa Olajide    
Pages - 109 - 126     |    Revised - 30-06-2025     |    Published - 01-08-2025    
Full Text Available  (392.56KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Enhancing Web Application Security through Browser-Native WAF Integration    
Hritesh Yadav, Ganapathy Subramanian Ramachandran    
Pages - 127 - 135     |    Revised - 30-06-2025     |    Published - 31-08-2025    
Full Text Available  (104.32KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Data-driven Security Analysis of System Audit Logs for Intrusion Detection and Prevention    
Sheena Sheela Rajan    
Pages - 136 - 145     |    Revised - 30-07-2025     |    Published - 31-08-2025    
Full Text Available  (589.07KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles