Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 3   ISSUE - 2    
Publication Date - April 2009      |       Pages - 62 - 153
Download Complete Issue    (1.98MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET    
Sundararajan Paramasivam Tharai Vinay, A.Shanmugam    
Pages - 62 - 75     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (206.45KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Embedding Software Engineering Disciplines in Entry-Level Programming    
Lung-Lung Liu    
Pages - 76 - 82     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (68.24KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Binary Replication Strategy for Large-Scale Mobile Environments    
Ashraf A Fadelelmoula, P.D.D.Dominic , Azween Bin Abdullah, Hamidah Ibrahim    
Pages - 83 - 104     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (371.16KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Data Quality Mining using Genetic Algorithm    
Sufal Das, Banani Saha    
Pages - 105 - 112     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (130.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Analysis of Natural Language Steganography    
Shaifizat Mansor, Roshidi bin Din, Azman Samsudin    
Pages - 113 - 125     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (435.08KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Deriving Value in Digital Media Networks    
Miguel Morales-Arroyo, Ravi S Sharma    
Pages - 126 - 137     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (275.27KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Modified One Time Pad Data Security Scheme: Random Key Generation Approach    
Sharad Dnyandev Patil, Ajay Kumar , Manoj Devare    
Pages - 138 - 145     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (109.15KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Towards a Flow-based Internet Traffic Classification For Bandwidth Optimization    
Sulaiman Mohd Nor, Abuagla Babiker Mohd    
Pages - 146 - 153     |    Revised - 05-05-2009     |    Published - 18-05-2009    
Full Text Available  (231.69KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles