Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 3   ISSUE - 5    
Publication Date - November 2009      |       Pages - 334 -447
Download Complete Issue    (3.22MB)
   
     
     
     
10 Records found in CSC-OpenAccess Library.    
     
     
Performance Analysis of Mobile Ad-hoc Network using AODV Protocol    
Aditya Goel, Ajali Sharma    
Pages - 334 - 343     |    Revised - 30-10-2009     |    Published - 30-11-2009    
Full Text Available  (436.51KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Testing Various Similarity Metrics and their Permutations with Clustering Approach in Context Free Data Cleaning    
Sohil Dineshkumar Pandya, Paresh V Virparia    
Pages - 344 - 350     |    Revised - 30-10-2009     |    Published - 30-11-2009    
Full Text Available  (82.51KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Mining Spatial Gene Expression Data Using Association Rules    
M.Anandhavalli, M.K.Ghose, K.Gauthaman    
Pages - 351 - 357     |    Revised - 26-11-2009     |    Published - 26-12-2009    
Full Text Available  (262.45KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
performance improvement and efficient approach for mining periodic sequential acess patterns    
D. Vasumathi, Dr. A. Govardhan , K.Venkateswara Rao    
Pages - 358 - 370     |    Revised - 26-11-2009     |    Published - 26-12-2009    
Full Text Available  (256.64KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Key Protection for Private Computing on Public Platforms    
Thomas H Morris, V.S.S. Nair    
Pages - 371 - 383     |    Revised - 26-11-2009     |    Published - 26-12-2009    
Full Text Available  (257.28KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Luby-Rackoff Based Cipher in a NewFeistel-Network Based LPRKES for Smart Cards    
Ehab Mahmoud Mohamed, Yasien Mahmoud, Hiroshi Furukawa    
Pages - 384 - 396     |    Revised - 26-11-2009     |    Published - 26-12-2009    
Full Text Available  (423.12KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Novel Score-Aware Routing Algorithm In Wireless Sensor Networks    
Hamid reza Hassaniasl, Amir Masoud Rahmani, Mashaallah Abbasi Dezfuli , Arash Nasiri Eghbali    
Pages - 397 - 404     |    Revised - 30-10-2009     |    Published - 30-11-2009    
Full Text Available  (714.95KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Efficient Password Security of Multi-Party Key Exchange Protocol Based on ECDLP    
Jayaprakash Kar, Banshidhar Majhi    
Pages - 405 - 413     |    Revised - 26-11-2009     |    Published - 26-12-2009    
Full Text Available  (97.58KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Share Loss Analysis of Internet Traffic Distribution in Computer Networks    
Diwakar Shukla, Virendra kumar Tiwari, Sanjay Thakur, Arvind Kumar Deshmukh    
Pages - 414 - 426     |    Revised - 16-09-2009     |    Published - 16-10-2009    
Full Text Available  (152.35KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Motion tracking in MRI by Harmonic State Model: Case of heart left ventricle    
P. Lionel Evina Ekmobo, Mohammed Oumsis, Mohammed Meknassi    
Pages - 428 - 447     |    Revised - 31-08-2009     |    Published - 31-09-2009    
Full Text Available  (453.34KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles