Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
March 31, 2024

NOTIFICATION
April 30, 2024

PUBLICATION
May 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 5   ISSUE - 2    
Publication Date - May / June 2011      |       Pages - 168 -297
Download Complete Issue    (5.53MB)
   
     
     
     
10 Records found in CSC-OpenAccess Library.    
     
     
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service    
Marimuthu K, Ganesh Gopal D    
Pages - 168 - 180     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (157.55KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Three Dimensional Database: Artificial Intelligence to eCommerce Web service Agents    
R. Vadivel, K. Baskaran    
Pages - 181 - 192     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (408.09KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A New Function-based Framework for Classification and Evaluation of Mutual Exclusion Algorithms in Distributed Systems    
Leila Omrani , Zahra Rafinezhad, Mohammadreza Kayvanpour    
Pages - 193 - 200     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (90.76KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
J48 and JRIP Rules for E-Governance Data    
Anil Rajput, Ramesh Prasad Aharwal, Meghna Dubey, S.P. Saxena, Manmohan Raghuvanshi    
Pages - 201 - 207     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (706.88KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Concurrent Matrix Multiplication on Multi-core Processors    
Muhammad Ali Ismail, S. H. Mirza, Talat Altaf    
Pages - 208 - 220     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (1.43MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Radical Data Compression Algorithm Using Factorization    
Peter Zirra, Gregory Wajiga    
Pages - 221 - 226     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (98.16KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Cryptographic Algorithms For Secure Data Communication    
Peter Zirra, Gregory Wajiga    
Pages - 227 - 243     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (403.89KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
A Study of Protocols for Grid Computing Environment    
Suresh Jaganathan, A Srinivasan, A Damodaram    
Pages - 244 - 276     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (607.02KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Phishing: A Field Experiment    
Danuvasin Charoen    
Pages - 277 - 286     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (1.06MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Design and Implementation of a Multi-Agent System for the Job Shop Scheduling Problem    
Leila Asadzadeh, Kamran Zamanifar    
Pages - 287 - 297     |    Revised - 01-05-2011     |    Published - 31-05-2011    
Full Text Available  (525.91KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles