Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 5 ISSUE - 3 | ||||
| Publication Date - July / August 2011 | Pages - 298 - 393 Download Complete Issue |
||||
| 9 Records found in CSC-OpenAccess Library. | ||||
| Survey Paper: Cryptography Is The Science Of Information Security | ||||
| Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh | ||||
| Pages - 298 - 309 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Automatic Detection of Malaria Parasites for Estimating Parasitemia | ||||
| S. S. Savkare, S. P. Narote | ||||
| Pages - 310 - 315 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Information Security Maturity Model | ||||
| Malik F. Saleh | ||||
| Pages - 316 - 337 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Toward a New Algorithm for Hands Free Browsing | ||||
| Murad Al-Rajab, Haifaa Kattan | ||||
| Pages - 338 - 345 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Distributed Approach to Defend Web Service from DDoS Attacks | ||||
| Monika Sachdeva, Gurvinder Singh, Kuldip Singh | ||||
| Pages - 346 - 355 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Development of an Efficient Computing Multilingualism Model for Diacritical Marks in Arabic and Hindi | ||||
| Abu Sarwar Zamani, Nasser Al Arifi, Md. Mobin Akhtar | ||||
| Pages - 356 - 367 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Black Box Backup System | ||||
| iyad Ahmad Aldasouqi, Arafat Awajan | ||||
| Pages - 368 - 375 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection | ||||
| Anissa Bouzalmat, Naouar Belghini, Arsalane Zarghili, Jamal Kharroubi, Aicha Majda | ||||
| Pages - 376 - 386 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Finding Relationships between the Our-NIR Cluster Results | ||||
| N.Sudhakar Reddy | ||||
| Pages - 387 - 393 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
