Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
|

![]() |
HOME | ![]() |
About IJCSS | ![]() |
Editorial Board | ![]() |
Call For Papers/Editors | ![]() |
Submission Guidelines | ![]() |
Citation Report | ![]() |
Issues Archive | ![]() |
Subscribe IJCSS | |||||||
|
ISSUE MANUSCRIPTS
VOLUME - 5 ISSUE - 3 | ||||
Publication Date - July / August 2011 | Pages - 298 - 393 Download Complete Issue ![]() |
||||
9 Records found in CSC-OpenAccess Library. | ||||
Survey Paper: Cryptography Is The Science Of Information Security | ||||
Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh | ||||
Pages - 298 - 309 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Automatic Detection of Malaria Parasites for Estimating Parasitemia | ||||
S. S. Savkare, S. P. Narote | ||||
Pages - 310 - 315 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Information Security Maturity Model | ||||
Malik F. Saleh | ||||
Pages - 316 - 337 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Toward a New Algorithm for Hands Free Browsing | ||||
Murad Al-Rajab, Haifaa Kattan | ||||
Pages - 338 - 345 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Distributed Approach to Defend Web Service from DDoS Attacks | ||||
Monika Sachdeva, Gurvinder Singh, Kuldip Singh | ||||
Pages - 346 - 355 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Development of an Efficient Computing Multilingualism Model for Diacritical Marks in Arabic and Hindi | ||||
Abu Sarwar Zamani, Nasser Al Arifi, Md. Mobin Akhtar | ||||
Pages - 356 - 367 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Black Box Backup System | ||||
iyad Ahmad Aldasouqi, Arafat Awajan | ||||
Pages - 368 - 375 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection | ||||
Anissa Bouzalmat, Naouar Belghini, Arsalane Zarghili, Jamal Kharroubi, Aicha Majda | ||||
Pages - 376 - 386 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Finding Relationships between the Our-NIR Cluster Results | ||||
N.Sudhakar Reddy | ||||
Pages - 387 - 393 | Revised - 01-07-2011 | Published - 05-08-2011 | ||||
Full Text Available ![]() |
||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||