|
|
|
ABOUT IJCSS |
International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.
By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.
IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications
IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.
|
|
|
|
CURRENT ISSUE - Volume-14, Issue-5, December 31, 2020 |
|
 |
Social Big Data: Techniques and Recent Applications |
|
|
Tina Tian |
|
Department of Computer Science, Manhattan College, New York - United States of America |
|
|
|
|
 |
A Study On Node Authentication and Identification In IOT Based Smart Homes |
|
|
Naif Waheb Rajkhan, Jia Song |
|
Computer Science Department, University of Idaho, Moscow, ID, 83844 - United States of America |
|
|
|
|
 |
A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing |
|
|
Baoying Lou, Jia Song |
|
Computer Science Department, University of Idaho, Moscow, ID, 83844 - United States of America |
|
|
|
|
 |
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques |
|
|
Eric Brown, Mohammed Ketel |
|
Applied Information Technology, University of Baltimore, Baltimore, Maryland - United States of America |
|
|
|
|
 |
Method of Identifying the State of Computer System under the Condition of Fuzzy Source Data |
|
|
Svitlana Gavrylenko, Viktor Chelak, Michael Kazarinov |
|
Computer Engineering and Programming Department, National Technical University “Kharkiv Polytechnic Institute”, Kharkiv - Ukraine |
|
|
|
|
 |
Virtualization and Security Aspects: An Overview |
|
|
Rui Filipe Pereira, Rui Miguel Silva, Joăo Pedro Orvalho |
|
Lab UbiNET – Computer Science Security and Cybercrime, Polytechnic Institute Of Beja, Beja - Portugal |
|
|
|
|
|
|