Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 14 ISSUE - 2 | ||||
| Publication Date - June 2020 | Pages - 13 - 93 |
||||
| 6 Records found in CSC-OpenAccess Library. | ||||
| A Survey On Solid-State Drive Forensic Analysis Techniques | ||||
| Avinash Kumar, Ashar Neyaz, Narasimha Karpoor Shashidhar | ||||
| Pages - 13 - 21 | Revised - 30-04-2020 | Published - 01-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Review on Data Falsification-Based attacks In Cooperative Intelligent Transportation Systems | ||||
| Sultan Ahmed Almalki, Jia Song | ||||
| Pages - 22 - 37 | Revised - 30-04-2020 | Published - 01-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Security, Privacy and Steganographic Analysis of FaceApp and TikTok | ||||
| Ashar Neyaz, Avinash Kumar, Sundar Krishnan, Jessica Placker, Qingzhong Liu | ||||
| Pages - 38 - 59 | Revised - 30-04-2020 | Published - 01-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Application of Blockchain and Smart Contracts on the Internet of Things | ||||
| Nicholas Lucci, Mohammed Ketel | ||||
| Pages - 60 - 71 | Revised - 31-05-2020 | Published - 30-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Trusting Smart Speakers: Understanding the Different Levels of Trust between Technologies | ||||
| Alec Wells, Aminu Bello Usman, Justin McKeown | ||||
| Pages - 72 - 81 | Revised - 31-05-2020 | Published - 30-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Software Architecture Erosion: Impacts, Causes, and Management | ||||
| Sharon Andrews, Mark Sheppard | ||||
| Pages - 82 - 93 | Revised - 31-05-2020 | Published - 30-06-2020 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
