Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 3 ISSUE - 2 | ||||
| Publication Date - April 2009 | Pages - 62 - 153 Download Complete Issue |
||||
| 8 Records found in CSC-OpenAccess Library. | ||||
| Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET | ||||
| Sundararajan Paramasivam Tharai Vinay, A.Shanmugam | ||||
| Pages - 62 - 75 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Embedding Software Engineering Disciplines in Entry-Level Programming | ||||
| Lung-Lung Liu | ||||
| Pages - 76 - 82 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Binary Replication Strategy for Large-Scale Mobile Environments | ||||
| Ashraf A Fadelelmoula, P.D.D.Dominic , Azween Bin Abdullah, Hamidah Ibrahim | ||||
| Pages - 83 - 104 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Data Quality Mining using Genetic Algorithm | ||||
| Sufal Das, Banani Saha | ||||
| Pages - 105 - 112 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Analysis of Natural Language Steganography | ||||
| Shaifizat Mansor, Roshidi bin Din, Azman Samsudin | ||||
| Pages - 113 - 125 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Deriving Value in Digital Media Networks | ||||
| Miguel Morales-Arroyo, Ravi S Sharma | ||||
| Pages - 126 - 137 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Modified One Time Pad Data Security Scheme: Random Key Generation Approach | ||||
| Sharad Dnyandev Patil, Ajay Kumar , Manoj Devare | ||||
| Pages - 138 - 145 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Towards a Flow-based Internet Traffic Classification For Bandwidth Optimization | ||||
| Sulaiman Mohd Nor, Abuagla Babiker Mohd | ||||
| Pages - 146 - 153 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
