Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 2 ISSUE - 1 | ||||
| Publication Date - February 2008 | Pages - 1 - 86 Download Complete Issue |
||||
| 7 Records found in CSC-OpenAccess Library. | ||||
| A Survey on MANET Intrusion Detection | ||||
| Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah | ||||
| Pages - 1 - 11 | Revised - 15-08-2007 | Published - 30-08-2007 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Implementation of Radial Basis Function Neural Network for Image Steganalysis | ||||
| Sambasiva Rao Baragada, S. Ramakrishna, M.S. Rao, S. Purushothaman | ||||
| Pages - 12 - 22 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Segmentation of Malay Syllables in Connected Digit Speech Using Statistical Approach | ||||
| M-S Salam, Dzulkifli Mohamad, S-H Salleh | ||||
| Pages - 23 - 33 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| GPS-less Localization Protocol for Underwater Acoustic Networks | ||||
| A.K. Othman | ||||
| Pages - 34 - 48 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Detecting and Preventing Attacks Using Network Intrusion Detection Systems | ||||
| Meera Gandhi, S.K.Srivatsa | ||||
| Pages - 49 - 60 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| RB-GDM: A Role-Based Grid Delegation Model | ||||
| G Geethakumari, Atul Negi, V N Sastry | ||||
| Pages - 61 - 72 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Implementation of Echostate Network in NIDS | ||||
| Meera Gandhi, S.K. Srivatsa | ||||
| Pages - 73 - 86 | Revised - 15-02-2008 | Published - 30-02-2008 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
