Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 6 ISSUE - 4 | ||||
| Publication Date - August 2012 | Pages - 203 - 294 Download Complete Issue |
||||
| 8 Records found in CSC-OpenAccess Library. | ||||
| Data Security In Relational Database Management System | ||||
| R.Balasubramaniam | ||||
| Pages - 203 - 210 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Automated Data Integration, Cleaning and Analysis Using Data Mining and SPSS Tool For Technical School in Malaysia | ||||
| Tajul Rosli Razak, Abdul Hapes Mohammed, Noorfaizalfarid Hj Mohd Noor, Muhamad Arif Hashim | ||||
| Pages - 211 - 225 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment | ||||
| Mohd Nazri Ismail, Abdulaziz Aborujilah, Shahrulniza Musa, AAmir Shahzad | ||||
| Pages - 226 - 237 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Software Design Level Vulnerability Classification Model | ||||
| Shabana Rehman, Khurram Mustafa | ||||
| Pages - 238 - 255 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Performance Review of Zero Copy Techniques | ||||
| Jia Song, Jim Alves-Foss | ||||
| Pages - 256 - 268 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Flow Modeling Based Wall Element Technique | ||||
| Sabah Tamimi | ||||
| Pages - 269 - 276 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones | ||||
| Torben Kuseler, Ihsan Alshahib Lami | ||||
| Pages - 277 - 287 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Comparative Analysis of Algorithms for Single Source Shortest Path Problem | ||||
| Shweta Srivastava | ||||
| Pages - 288 - 294 | Revised - 15-07-2012 | Published - 10-08-2012 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
