Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 5 ISSUE - 1 | ||||
Publication Date - March / April 2011 | Pages - 1 - 167 Download Complete Issue (3.68MB) |
||||
14 Records found in CSC-OpenAccess Library. | ||||
Stream Processing Environmental Applications in Jordan Valley | ||||
Iyad Ahmad Aldasouqi, Jalal Atoum | ||||
Pages - 1 - 13 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (476.92KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining | ||||
Manpreet Singh, Gurvinder Singh | ||||
Pages - 14 - 27 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (94.89KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation | ||||
Kohei Arai, Tri Harsono, Achmad Basuki | ||||
Pages - 28 - 38 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (265.48KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs) | ||||
Michael Kimwele, Waweru Mwangi, Stephen Kimani | ||||
Pages - 39 - 53 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (115.44KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Image Recognition With the Help of Auto-Associative Neural Network | ||||
Moumi Pandit, Mousumi Gupta | ||||
Pages - 54 - 63 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (166.27KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition | ||||
Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan | ||||
Pages - 64 - 71 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (431.3KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Authentication and Authorization Models | ||||
More V.N | ||||
Pages - 72 - 84 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (128.88KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Security Model for Hierarchical Clustered Wireless Sensor Networks | ||||
Kalpana Sharma, S. K. Ghosh, M.K. Ghose | ||||
Pages - 85 - 97 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (160.53KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents | ||||
Nirmala C R, V.Ramaswamy | ||||
Pages - 98 - 106 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (643.05KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings | ||||
B.Umaprasada Rao, P.Vasudeva Reddy | ||||
Pages - 107 - 117 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (117.8KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Systematic Digital Forensic Investigation Model | ||||
Ankit Agarwal, Saurabh Gupta, Subhash Chand, Megha Gupta | ||||
Pages - 118 - 131 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (165.72KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Secure E-Commerce Protocol | ||||
Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin | ||||
Pages - 132 - 142 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (147.85KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Diacritic Oriented Arabic Information Retrieval System | ||||
Khalid Saleh Aloufi | ||||
Pages - 143 - 155 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (299.95KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
An Ant Algorithm for Solving QoS Multicast Routing Problem | ||||
Ahmed Younes Hamed | ||||
Pages - 156 - 167 | Revised - 31-03-2011 | Published - 04-04-2011 | ||||
Full Text Available (246.54KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||