Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
|

![]() |
HOME | ![]() |
About IJCSS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJCSS | |||||||
|
ISSUE MANUSCRIPTS
VOLUME - 3 ISSUE - 2 | ||||
Publication Date - April 2009 | Pages - 62 - 153 Download Complete Issue ![]() |
||||
8 Records found in CSC-OpenAccess Library. | ||||
Behavior Based Anomaly Detection Technique to Mitigate the Routing Misbehavior in MANET | ||||
Sundararajan Paramasivam Tharai Vinay, A.Shanmugam | ||||
Pages - 62 - 75 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Embedding Software Engineering Disciplines in Entry-Level Programming | ||||
Lung-Lung Liu | ||||
Pages - 76 - 82 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Binary Replication Strategy for Large-Scale Mobile Environments | ||||
Ashraf A Fadelelmoula, P.D.D.Dominic , Azween Bin Abdullah, Hamidah Ibrahim | ||||
Pages - 83 - 104 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Data Quality Mining using Genetic Algorithm | ||||
Sufal Das, Banani Saha | ||||
Pages - 105 - 112 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Analysis of Natural Language Steganography | ||||
Shaifizat Mansor, Roshidi bin Din, Azman Samsudin | ||||
Pages - 113 - 125 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Deriving Value in Digital Media Networks | ||||
Miguel Morales-Arroyo, Ravi S Sharma | ||||
Pages - 126 - 137 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Modified One Time Pad Data Security Scheme: Random Key Generation Approach | ||||
Sharad Dnyandev Patil, Ajay Kumar , Manoj Devare | ||||
Pages - 138 - 145 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Towards a Flow-based Internet Traffic Classification For Bandwidth Optimization | ||||
Sulaiman Mohd Nor, Abuagla Babiker Mohd | ||||
Pages - 146 - 153 | Revised - 05-05-2009 | Published - 18-05-2009 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||