Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
|

![]() |
HOME | ![]() |
About IJCSS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJCSS | |||||||
|
ISSUE MANUSCRIPTS
VOLUME - 1 ISSUE - 1 | ||||
Publication Date - June 2007 | Pages - 1 - 96 Download Complete Issue ![]() |
||||
8 Records found in CSC-OpenAccess Library. | ||||
Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems. | ||||
Amit Chhabra, Gurvinder Singh | ||||
Pages - 1 - 10 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Secure Key Agreement Protocol using Trusted Third Party. | ||||
Sairam Kulkarni, Debashih Jena, Sanjay Kumar Jena | ||||
Pages - 11 - 18 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Active Contours Without Edges and Curvature Analysis for Endoscopic Image Classification. | ||||
B.V.Dhandra, Ravindra Hegadi | ||||
Pages - 19 - 32 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Simple Encryption/Decryption Application. | ||||
Majdi Al-qdah, Lin Yi Hui | ||||
Pages - 33 - 40 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Morphological Reconstruction for Word Level Script Identification. | ||||
B. V. Dhandra, Mallikarjun Hangarge | ||||
Pages - 41 - 51 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Review Paper on Ad Hoc Network Security. | ||||
Karan Singh, Rama Shankar Yadav, Ranvijay | ||||
Pages - 52 - 69 | Revised - 15-06-2007 | Published - 30-05-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Review of Studies On Machine Learning Techniques. | ||||
Yogesh Singh, Pradeep Kumar Bhatia, Omprakash Sangwan | ||||
Pages - 70 - 84 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Texting Satisfaction: Does Age and Gender Make a Difference? | ||||
Vimala Balakrishnan, Paul H. P. Yeow | ||||
Pages - 85 - 96 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||