Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 3 ISSUE - 2 | ||||
Publication Date - April 2009 | Pages - 62 - 153 Download Complete Issue (1.98MB) |
||||
8 Records found in CSC-OpenAccess Library. | ||||
Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET | ||||
Sundararajan Paramasivam Tharai Vinay, A.Shanmugam | ||||
Pages - 62 - 75 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (206.45KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Embedding Software Engineering Disciplines in Entry-Level Programming | ||||
Lung-Lung Liu | ||||
Pages - 76 - 82 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (68.24KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Binary Replication Strategy for Large-Scale Mobile Environments | ||||
Ashraf A Fadelelmoula, P.D.D.Dominic , Azween Bin Abdullah, Hamidah Ibrahim | ||||
Pages - 83 - 104 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (371.16KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Data Quality Mining using Genetic Algorithm | ||||
Sufal Das, Banani Saha | ||||
Pages - 105 - 112 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (130.14KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Analysis of Natural Language Steganography | ||||
Shaifizat Mansor, Roshidi bin Din, Azman Samsudin | ||||
Pages - 113 - 125 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (435.08KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Deriving Value in Digital Media Networks | ||||
Miguel Morales-Arroyo, Ravi S Sharma | ||||
Pages - 126 - 137 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (275.27KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Modified One Time Pad Data Security Scheme: Random Key Generation Approach | ||||
Sharad Dnyandev Patil, Ajay Kumar , Manoj Devare | ||||
Pages - 138 - 145 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (109.15KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Towards a Flow-based Internet Traffic Classification For Bandwidth Optimization | ||||
Sulaiman Mohd Nor, Abuagla Babiker Mohd | ||||
Pages - 146 - 153 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available (231.69KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||