Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 14   ISSUE - 5    
Publication Date - December 2020      |       Pages - 154 - 234
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
Virtualization and Security Aspects: An Overview    
Rui Filipe Pereira, Rui Miguel Silva, João Pedro Orvalho    
Pages - 154 - 173     |    Revised - 31-10-2020     |    Published - 01-12-2020    
Full Text Available  (369.94KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Method of Identifying the State of Computer System under the Condition of Fuzzy Source Data    
Svitlana Gavrylenko, Viktor Chelak, Michael Kazarinov    
Pages - 174 - 186     |    Revised - 31-10-2020     |    Published - 01-12-2020    
Full Text Available  (491.76KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques    
Eric Brown, Mohammed Ketel    
Pages - 187 - 199     |    Revised - 30-11-2020     |    Published - 31-12-2020    
Full Text Available  (271.57KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing    
Baoying Lou, Jia Song    
Pages - 200 - 209     |    Revised - 30-11-2020     |    Published - 31-12-2020    
Full Text Available  (331.39KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Study On Node Authentication and Identification In IOT Based Smart Homes    
Naif Waheb Rajkhan, Jia Song    
Pages - 210 - 223     |    Revised - 30-11-2020     |    Published - 31-12-2020    
Full Text Available  (333.62KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Social Big Data: Techniques and Recent Applications    
Tina Tian    
Pages - 224 - 234     |    Revised - 30-11-2020     |    Published - 31-12-2020    
Full Text Available  (199.96KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles