Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
|

![]() |
HOME | ![]() |
About IJCSS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJCSS | |||||||
|
ISSUE MANUSCRIPTS
VOLUME - 5 ISSUE - 5 | ||||
Publication Date - November / December 2011 | Pages - 425 - 526 Download Complete Issue ![]() |
||||
10 Records found in CSC-OpenAccess Library. | ||||
Non-Specialized File Format Extension | ||||
Blake W. Ford, Khosrow Kaikhah | ||||
Pages - 425 - 432 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images | ||||
Priyanka Singh, Priti Singh | ||||
Pages - 433 - 442 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks | ||||
Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi | ||||
Pages - 443 - 455 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding | ||||
P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini | ||||
Pages - 456 - 468 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Steganography Technique that Embeds Security along with Compression | ||||
Anuradaha, Nidhi Sharma, Rimple gilhotra | ||||
Pages - 469 - 476 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Phishing Website Detection Using Particle Swarm Optimization | ||||
Radha Damodaram , M.L.Valarmathi | ||||
Pages - 477 - 490 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Maintenance of Network Connectivity Across Process Migration | ||||
Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi, Elnaz Safarzadeh | ||||
Pages - 491 - 495 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Detection of Botnets using Honeypots and P2P Botnets | ||||
Rajab Challoo, Raghavendra Kotapalli | ||||
Pages - 496 - 502 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets | ||||
B.K. Raghavendra, S.K. Srivatsa | ||||
Pages - 503 - 511 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Dynamic Audio-Visual Client Recognition modelling | ||||
Tijjani Adam Shuwa, U. Hashim | ||||
Pages - 512 - 526 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||