Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 5 ISSUE - 1 | ||||
| Publication Date - March / April 2011 | Pages - 1 - 167 Download Complete Issue |
||||
| 14 Records found in CSC-OpenAccess Library. | ||||
| Stream Processing Environmental Applications in Jordan Valley | ||||
| Iyad Ahmad Aldasouqi, Jalal Atoum | ||||
| Pages - 1 - 13 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining | ||||
| Manpreet Singh, Gurvinder Singh | ||||
| Pages - 14 - 27 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation | ||||
| Kohei Arai, Tri Harsono, Achmad Basuki | ||||
| Pages - 28 - 38 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs) | ||||
| Michael Kimwele, Waweru Mwangi, Stephen Kimani | ||||
| Pages - 39 - 53 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Image Recognition With the Help of Auto-Associative Neural Network | ||||
| Moumi Pandit, Mousumi Gupta | ||||
| Pages - 54 - 63 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition | ||||
| Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan | ||||
| Pages - 64 - 71 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Authentication and Authorization Models | ||||
| More V.N | ||||
| Pages - 72 - 84 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Security Model for Hierarchical Clustered Wireless Sensor Networks | ||||
| Kalpana Sharma, S. K. Ghosh, M.K. Ghose | ||||
| Pages - 85 - 97 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents | ||||
| Nirmala C R, V.Ramaswamy | ||||
| Pages - 98 - 106 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings | ||||
| B.Umaprasada Rao, P.Vasudeva Reddy | ||||
| Pages - 107 - 117 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Systematic Digital Forensic Investigation Model | ||||
| Ankit Agarwal, Saurabh Gupta, Subhash Chand, Megha Gupta | ||||
| Pages - 118 - 131 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Secure E-Commerce Protocol | ||||
| Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin | ||||
| Pages - 132 - 142 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Diacritic Oriented Arabic Information Retrieval System | ||||
| Khalid Saleh Aloufi | ||||
| Pages - 143 - 155 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| An Ant Algorithm for Solving QoS Multicast Routing Problem | ||||
| Ahmed Younes Hamed | ||||
| Pages - 156 - 167 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
