Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Malaysia"

Total 798 records found in CSC-OpenAccess Library.
Page 3 of 40    Previous | Next
New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment
Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad
Pages - 226 - 237     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 6,   Issue - 4, International Journal of Computer Science and Security (IJCSS)
Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia
Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Hj Mohd Noor, Muhamad Arif Hashim
UNIVERSITI TEKNOLOGI MARA (PERLIS)
Pages - 211 - 225     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 6,   Issue - 4, International Journal of Computer Science and Security (IJCSS)
Performance Comparison of Musical Instrument Family Classification Using Soft Set
Saima Anwar Lashari, Rosziati Ibrahim, Norhalina Senan
Universiti Tun Hussein Onn Malaysia
Pages - 100 - 110     |    Revised - 15-07-2012     |    Published - 10-08-2012
Volume - 3,   Issue - 4, International Journal of Artificial Intelligence and Expert Systems (IJAE)
Image Steganography Techniques: An Overview
Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi
University Malaysia Perlis
Pages - 168 - 187     |    Revised - 15-05-2012     |    Published - 20-06-2012
Volume - 6,   Issue - 3, International Journal of Computer Science and Security (IJCSS)
Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication
Aamir Shahzad, Shahrulniza Musa
Universiti Kuala Lumpur
Pages - 28 - 44     |    Revised - 15-05-2012     |    Published - 20-06-2012
Volume - 6,   Issue - 3, International Journal of Security (IJS)
Comparison of Interpolation Methods in Prediction the Pattern of Basal Stem Rot Diesease in Palm Oil Plantation
Somayeh Kheirandish , Mahsa liaghat , Tengku Mohd Azahar, Adel Gohari
University Technology Malaysia
Pages - 12 - 16     |    Revised - 15-03-2012     |    Published - 16-04-2012
Volume - 2,   Issue - 1, Geoinformatica - An International Journal (GIIJ)
The Effectiveness of Human Resource Management Practices
Eric Ng Chee Hong, Lam Zheng Hao, Ramesh Kumar, Charles Ramendran, Vimala Kadiresan
UNIVERSITI TUNKU ABDUL RAHMAN
Pages - 60 - 79     |    Revised - 15-03-2012     |    Published - 16-04-2012
Volume - 3,   Issue - 2, International Journal of Business Research Management (IJBRM)
An Exploratory Study of Internal Control and Fraud Prevention Measures in SMEs
Jaya Kumar Shanmugam, Mohd Hassan Che Haat, Azwadi Ali
Universiti Malaysia Terengganu
Pages - 90 - 99     |    Revised - 15-03-2012     |    Published - 16-04-2012
Volume - 3,   Issue - 2, International Journal of Business Research Management (IJBRM)
A Study on the Effects of Tyre Vibration to the Noise in Passenger Car Cabin
Ahmad Kadri Junoh, Zulkifli Mohd Nopiah, Abdull Halim Abdul, Mohd. Jailani Mohd Nor, Ahmad Kamal Ariffin Mohd. Ihsan, Mohammad Hosseini Fouladi
UNIVERSITI MALAYSIA PERLIS
Pages - 53 - 69     |    Revised - 15-01-2012     |    Published - 21-02-2012
Volume - 6,   Issue - 1, International Journal of Engineering (IJE)
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages
Mallikka Rajalingam, Salah Ali Alomari, Putra Sumari
Universiti Sains malaysia
Pages - 1 - 18     |    Revised - 15-01-2012     |    Published - 21-02-2012
Volume - 6,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions