Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "United States"

Total 1010 records found in CSC-OpenAccess Library.
Page 7 of 51    Previous | Next
Interplay of Digital Forensics in eDiscovery
Sundar Krishnan, Narasimha Shashidhar
Department of Computer Science, Sam Houston State University, Huntsville, TX
Pages - 19 - 44     |    Revised - 31-03-2021     |    Published - 30-04-2021
Volume - 15,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
Audit Quality and Environment, Social, and Governance Risks
Meiying Hua, Pervaiz Alam
Department of Accounting, Beacom School of Business, University of South Dakota, Vermillion, S.D., 57069
Pages - 50 - 75     |    Revised - 01-03-2021     |    Published - 01-04-2021
Volume - 12,   Issue - 2, International Journal of Business Research Management (IJBRM)
Novel Cost-effective Technique for Continued Operation of Electrical Equipment During Voltage Sag
Shiva K. Sadula, Rajab Challoo, Xingang Fu, Shuhui Li
Department of Electrical Engineering and Computer Science, Texas A&M University-Kingsville, Kingsville, TX 78363-8202
Pages - 12 - 47     |    Revised - 31-01-2021     |    Published - 28-02-2021
Volume - 13,   Issue - 1, International Journal of Engineering (IJE)
A Study On Node Authentication and Identification In IOT Based Smart Homes
Naif Waheb Rajkhan, Jia Song
Computer Science Department, University of Idaho, Moscow, ID, 83844
Pages - 210 - 223     |    Revised - 30-11-2020     |    Published - 31-12-2020
Volume - 14,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing
Baoying Lou, Jia Song
Computer Science Department, University of Idaho, Moscow, ID, 83844
Pages - 200 - 209     |    Revised - 30-11-2020     |    Published - 31-12-2020
Volume - 14,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques
Eric Brown, Mohammed Ketel
Applied Information Technology, University of Baltimore, Baltimore, Maryland
Pages - 187 - 199     |    Revised - 30-11-2020     |    Published - 31-12-2020
Volume - 14,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Social Big Data: Techniques and Recent Applications
Tina Tian
Department of Computer Science, Manhattan College, New York
Pages - 224 - 234     |    Revised - 30-11-2020     |    Published - 31-12-2020
Volume - 14,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Comparison of Three Weibull Extensions; Generalized Gamma, Exponentiated Weibull, and Odd Weibull Distributions
Nonhle Channon Mdziniso, Kahadawala Cooray
Department of Mathematical and Digital Sciences, Bloomsburg University of Pennsylvania, Bloomsburg, PA 17815-1301
Pages - 18 - 30     |    Revised - 31-10-2020     |    Published - 01-12-2020
Volume - 8,   Issue - 2, International Journal of Scientific and Statistical Computing (IJSSC)
Method of Identifying the State of Computer System under the Condition of Fuzzy Source Data
Svitlana Gavrylenko, Viktor Chelak, Michael Kazarinov
Computer Science Department, Northeastern Illinois University, Chicago, IL
Pages - 174 - 186     |    Revised - 31-10-2020     |    Published - 01-12-2020
Volume - 14,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Dealing with Data Breaches Amidst Changes In Technology
Fuad S Alharbi
Cybersecurity Department, Marymount University, Arlington, 22201
Pages - 108 - 114     |    Revised - 31-07-2020     |    Published - 31-08-2020
Volume - 14,   Issue - 3, International Journal of Computer Science and Security (IJCSS)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions