Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
April 30, 2024

NOTIFICATION
May 31, 2024

PUBLICATION
June 30, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.691

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 6   ISSUE - 3    
Publication Date - June 2012      |       Pages - 150 - 202
Download Complete Issue    (1.17MB)
   
     
     
     
3 Records found in CSC-OpenAccess Library.    
     
     
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks    
David Fotue, Houda Labiod, Thomas Engel    
Pages - 150 - 167     |    Revised - 15-05-2012     |    Published - 20-06-2012    
Full Text Available  (477KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Image Steganography Techniques: An Overview    
Nagham Hamid, Abid Yahya, R. Badlishah Ahmad, Osamah M. Al-Qershi    
Pages - 168 - 187     |    Revised - 15-05-2012     |    Published - 20-06-2012    
Full Text Available  (196.61KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Cluster Based Misbehaviour Detection and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks    
R. Murugan, A. Shanmugam    
Pages - 188 - 202     |    Revised - 15-05-2012     |    Published - 20-06-2012    
Full Text Available  (320.22KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles