Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 4   ISSUE - 5    
Publication Date - December 2010      |       Pages - 436 - 496
Download Complete Issue    (2.37MB)
   
     
     
     
5 Records found in CSC-OpenAccess Library.    
     
     
A Proposed Security Model for Web Enabled Business Process Management System    
M. S. Kandil, Mohamed Abu El-Soud , A. E. Hassan , Abd Elghafar M. Elhady    
Pages - 436 - 450     |    Revised - 30-11-200     |    Published - 20-12-2010    
Full Text Available  (414.81KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Approach for Managing Knowledge in Digital Forensics Examinations    
April Tanner, David Dampier    
Pages - 451 - 465     |    Revised - 30-11-2010     |    Published - 20-12-2010    
Full Text Available  (310.56KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Securing Image Transmission Using in- Compression Encryption Technique    
Shaimaa Ahmed Elsaid, Khalid F. A. Hussein, Mohamed M. Fouad    
Pages - 466 - 481     |    Revised - 30-11-2010     |    Published - 20-12-2010    
Full Text Available  (1.02MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle    
Ghossoon Mohammed Waleed Al-Saadoon    
Pages - 482 - 490     |    Revised - 30-11-2010     |    Published - 20-12-2010    
Full Text Available  (206.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Performance Variation of LMS And Its Different Variants    
Sanjeev Kumar Dhull, DR .O. P SAHU    
Pages - 491 - 496     |    Revised - 30-11-2010     |    Published - 20-12-2010    
Full Text Available  (152.97KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles