Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 5 ISSUE - 5 | ||||
Publication Date - November / December 2011 | Pages - 425 - 526 Download Complete Issue (4.17MB) |
||||
10 Records found in CSC-OpenAccess Library. | ||||
Non-Specialized File Format Extension | ||||
Blake W. Ford, Khosrow Kaikhah | ||||
Pages - 425 - 432 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (65.01KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images | ||||
Priyanka Singh, Priti Singh | ||||
Pages - 433 - 442 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (180.47KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks | ||||
Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi | ||||
Pages - 443 - 455 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (252.27KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding | ||||
P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini | ||||
Pages - 456 - 468 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (383.22KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Steganography Technique that Embeds Security along with Compression | ||||
Anuradaha, Nidhi Sharma, Rimple gilhotra | ||||
Pages - 469 - 476 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (63.87KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Phishing Website Detection Using Particle Swarm Optimization | ||||
Radha Damodaram , M.L.Valarmathi | ||||
Pages - 477 - 490 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (441.46KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Maintenance of Network Connectivity Across Process Migration | ||||
Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi, Elnaz Safarzadeh | ||||
Pages - 491 - 495 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (49.57KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Detection of Botnets using Honeypots and P2P Botnets | ||||
Rajab Challoo, Raghavendra Kotapalli | ||||
Pages - 496 - 502 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (129.45KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets | ||||
B.K. Raghavendra, S.K. Srivatsa | ||||
Pages - 503 - 511 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (123.73KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Dynamic Audio-Visual Client Recognition modelling | ||||
Tijjani Adam Shuwa, U. Hashim | ||||
Pages - 512 - 526 | Revised - 01-11-2011 | Published - 15-12-2011 | ||||
Full Text Available (2.19MB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||