Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 13   ISSUE - 3    
Publication Date - June 2019      |       Pages - 53 - 123
   
     
     
     
5 Records found in CSC-OpenAccess Library.    
     
     
An Experimental Approach For Evaluating Superpixel's Consistency Over 2D Gaussian Blur and Impulse Noise Using Jaccard Similarity Coefficient    
Brekhna Brekhna, Caiming Zhang, Yuanfeng Zhou    
Pages - 53 - 72     |    Revised - 30-04-2019     |    Published - 01-06-2019    
Full Text Available  (2.87MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Approach of Human Emotional States Classification and Modeling from EEG    
Monira Islam, Md. Salah Uddin Yusuf, Mohiuddin Ahmad    
Pages - 73 - 89     |    Revised - 30-04-2019     |    Published - 01-06-2019    
Full Text Available  (828.01KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Information Leakage Prevention Using Public Key Encryption System and Fingerprint Augmented with Apriori Algorithm    
Mudasiru Hammed, Jumoke Soyemi    
Pages - 90 - 100     |    Revised - 31-05-2019     |    Published - 30-06-2019    
Full Text Available  (440.95KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Estimate the Activation of EEG Bands from Different Brain Lobes with Classified Music Stimulation    
Monira Islam, Md. Salah Uddin Yusuf, Chowdhury Azimul Haque    
Pages - 101 - 113     |    Revised - 31-05-2019     |    Published - 30-06-2019    
Full Text Available  (1.34MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Review on Grammar-Based Fuzzing Techniques    
Hamad Ali Al Salem, Jia Song    
Pages - 114 - 123     |    Revised - 31-05-2019     |    Published - 01-06-2019    
Full Text Available  (610.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles