|
|
|
ABOUT IJCSS |
International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.
By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.
IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications
IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.
|
|
|
|
RANDOMLY SELECTED PAPERS |
|
|
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis |
|
|
Niki Patel, Yanyan Li, Ahmad Reza Hadaegh |
|
Computer Science and Information System, California State University San Marcos, San Marcos, 92096 - United States of America |
|
|
|
|
|
MVC Architecture from Maintenance Quality Attributes Perspective |
|
|
Safia Nahhas |
|
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21577 - Saudi Arabia |
|
|
|
|
|
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques |
|
|
Eric Brown, Mohammed Ketel |
|
Applied Information Technology, University of Baltimore, Baltimore, Maryland - United States of America |
|
|
|
|
|
A Method of Constructing Balanced Repeated Measurement Designs for First Order Residual Effects in Information Security |
|
|
Chen-Chi Shing, Lee-Hur Shing |
|
School of Computer Science and Information Systems, Radford University, Radford, VA 24142 - United States of America |
|
|
|
|
|
Design and Implementation of a Predictive Model for Nigeria Local Football League |
|
|
ADEBISI John, ALABI Damilola |
|
Engineering/Computer, University of Namibia, Ongwediva - Namibia |
|
|
|
|
|
A Review on Library Fuzzing Tools |
|
|
Jia Song |
|
Computer Science Department, University of Idaho, Moscow, Idaho, 83844 - United States of America |
|
|
|
|
|
Security Behavior Intention of Employees with Hearing Difficulties: An Empirical Comparison Study |
|
|
Wisdom Umeugo |
|
University of the Cumberlands, Independent Researcher, Ottawa - Canada |
|
|
|
|
|
|