Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 6   ISSUE - 4    
Publication Date - August 2012      |       Pages - 203 - 294
Download Complete Issue    (6.3MB)
   
     
     
     
8 Records found in CSC-OpenAccess Library.    
     
     
Data Security In Relational Database Management System    
R.Balasubramaniam    
Pages - 203 - 210     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (606.66KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia    
Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Hj Mohd Noor, Muhamad Arif Hashim    
Pages - 211 - 225     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (2.14MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment    
Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad    
Pages - 226 - 237     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (350.69KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Software Design Level Vulnerability Classification Model    
Shabana Rehman, Khurram Mustafa    
Pages - 238 - 255     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (494.59KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Performance Review of Zero Copy Techniques    
Jia Song, Jim Alves-Foss    
Pages - 256 - 268     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (453.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Flow Modeling Based Wall Element Technique    
Sabah Tamimi    
Pages - 269 - 276     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (1.86MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones    
Torben Kuseler, Ihsan Alshahib Lami    
Pages - 277 - 287     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (157.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Comparative Analysis of Algorithms for Single Source Shortest Path Problem    
Shweta Srivastava    
Pages - 288 - 294     |    Revised - 15-07-2012     |    Published - 10-08-2012    
Full Text Available  (107.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles