Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 3   ISSUE - 6    
Publication Date - January 2010      |       Pages - 448 -594
Download Complete Issue    (4.9MB)
   
     
     
     
14 Records found in CSC-OpenAccess Library.    
     
     
A Wavelet - Based Object Watermarking System for MPEG4 Video    
Essaouabi Abdessamad, E.Ibnelhaj, F.Regragui    
Pages - 448 - 461     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (548.34KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
High Capacity and Security Steganography Using Discrete Wavelet Transform    
H S Manjunatha Reddy, K B Raja    
Pages - 462 - 472     |    Revised - 10-11-2009     |    Published - 12-12-2009    
Full Text Available  (377.58KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Hybrid Compression Encryption Technique for Securing SMS    
Tarek, Bahgat A. Abdel-latef, Awny A. Ahmed, Ahmed M Mahfouz    
Pages - 473 - 481     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (137.18KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
On the Usage of Chained Codes in Cryptography    
Omessaad Hamdi, Ammar Bouallegue, Sami Harari    
Pages - 482 - 490     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (124.87KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Parallel Framework For Multilayer Perceptron For Human Face Recognition    
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee , Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu    
Pages - 491 - 507     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (296.66KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Method for Quantitative Assessment of Software Quality    
C. V. Srikrishna, Neelam Bawane    
Pages - 508 - 517     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (131.46KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Hierarchical Non-blocking Coordinated Checkpointing Algorithms for Mobile Distributed Computing    
Surender, R.K. Chauhan, Parveen Kumar    
Pages - 518 - 524     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (95.43KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Implementation of Agent Based Dynamic Distributed Service    
Ravi Prakash Reddy, A.Damodaram    
Pages - 525 - 535     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (213.71KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Havoc Proof for Secure and Robust Audio Watermarking    
K.Vaitheki, R.Tamijetchelvy    
Pages - 536 - 549     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (236.72KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy Prevention    
Vineet Kumar Sharma, S.A.M. Rizvi, S. Zeeshan Hussain, Vignesh    
Pages - 550 - 558     |    Revised - 30-12-2009     |    Published - 31-01-2010    
Full Text Available  (104.49KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Knowledge Discovery Through Data Visualization Of Drive Test Data    
Shalini Saxena, Abhijit S. Pandya, Robert Stone, Saeed Rajput, Sam Hsu    
Pages - 559 - 568     |    Revised - 12-02-2010     |    Published - 19-02-2010    
Full Text Available  (828.98KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A lexisearch algorithm for the Bottleneck Traveling Salesman Problem    
Zakir H. Ahmed    
Pages - 569 - 577     |    Revised - 22-01-2010     |    Published - 22-02-2010    
Full Text Available  (111.8KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party    
Ajay Sharma, Ramveer Singh, Awakash Mishra, Abhishek Dwivedi, Deo Brat Ojha, Shree Garg    
Pages - 578 - 582     |    Revised - 08-02-2010     |    Published - 08-03-2010    
Full Text Available  (92.93KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method    
Asfandyar Khan, Nurul Hasan, Azween Abdullah    
Pages - 583 - 594     |    Revised - 08-02-2010     |    Published - 08-03-2010    
Full Text Available  (1.48MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles