Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 3 ISSUE - 1 | ||||
Publication Date - February 2009 | Pages - 1 - 75 Download Complete Issue (2.63MB) |
||||
6 Records found in CSC-OpenAccess Library. | ||||
Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching | ||||
Waleed Ali Ahmed, Siti Mariyam Shamsuddin | ||||
Pages - 1 - 15 | Revised - 20-02-2009 | Published - 15-03-2009 | ||||
Full Text Available (671.68KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network | ||||
Rajender Nath , Pankaj Kumar Sehgal | ||||
Pages - 16 - 22 | Revised - 20-03-2009 | Published - 15-03-2009 | ||||
Full Text Available (82.85KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
MMI Diversity Based Text Summarization | ||||
Mohammed Salem Binwahlan, Naomie Salim , Ladda Suanmali | ||||
Pages - 23 - 33 | Revised - 20-03-2009 | Published - 15-03-2009 | ||||
Full Text Available (145.7KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Asking Users: A Continuous Evaluation on Systems in a Controlled Environment | ||||
Suziah Sulaiman, Dayang Rohaya Awang Rambli, Wan Fatimah Wan Ahmad, Halabi Hasbullah, Foong Oi Mean, M Nordin Zakaria, Goh Kim Nee, Siti Rokhmah M Shukri | ||||
Pages - 34 - 42 | Revised - 20-02-2009 | Published - 15-03-2009 | ||||
Full Text Available (109.24KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Exploring Knowledge for a Common Man through Mobile Services and Knowledge Discovery in Databases | ||||
Mayank Dave, S. B. Singh, Sanjeev Manchanda | ||||
Pages - 43 - 61 | Revised - 20-02-2009 | Published - 15-03-2009 | ||||
Full Text Available (1.19MB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Testing of Contextual Role-Based Access Control Model (C-RBAC) | ||||
Muhammad Nabeel Tahir | ||||
Pages - 62 - 75 | Revised - 20-02-2009 | Published - 15-03-2009 | ||||
Full Text Available (315.88KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||