Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 5   ISSUE - 1    
Publication Date - March / April 2011      |       Pages - 1 - 167
Download Complete Issue    (3.68MB)
   
     
     
     
14 Records found in CSC-OpenAccess Library.    
     
     
Stream Processing Environmental Applications in Jordan Valley    
Iyad Ahmad Aldasouqi, Jalal Atoum    
Pages - 1 - 13     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (476.92KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining    
Manpreet Singh, Gurvinder Singh    
Pages - 14 - 27     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (94.89KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation    
Kohei Arai, Tri Harsono, Achmad Basuki    
Pages - 28 - 38     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (265.48KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs)    
Michael Kimwele, Waweru Mwangi, Stephen Kimani    
Pages - 39 - 53     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (115.44KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Image Recognition With the Help of Auto-Associative Neural Network    
Moumi Pandit, Mousumi Gupta    
Pages - 54 - 63     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (166.27KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition    
Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan    
Pages - 64 - 71     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (431.3KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Authentication and Authorization Models    
More V.N    
Pages - 72 - 84     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (128.88KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Security Model for Hierarchical Clustered Wireless Sensor Networks    
Kalpana Sharma, S. K. Ghosh, M.K. Ghose    
Pages - 85 - 97     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (160.53KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents    
Nirmala C R, V.Ramaswamy    
Pages - 98 - 106     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (643.05KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings    
B.Umaprasada Rao, P.Vasudeva Reddy    
Pages - 107 - 117     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (117.8KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Systematic Digital Forensic Investigation Model    
Ankit Agarwal, Saurabh Gupta, Subhash Chand, Megha Gupta    
Pages - 118 - 131     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (165.72KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Secure E-Commerce Protocol    
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin    
Pages - 132 - 142     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (147.85KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Diacritic Oriented Arabic Information Retrieval System    
Khalid Saleh Aloufi    
Pages - 143 - 155     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (299.95KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Ant Algorithm for Solving QoS Multicast Routing Problem    
Ahmed Younes Hamed    
Pages - 156 - 167     |    Revised - 31-03-2011     |    Published - 04-04-2011    
Full Text Available  (246.54KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles