Home   >   CSC-OpenAccess Library   >   Computer Science (General)   >  International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly   |   Established - 2007   |   Year of Publication - 2024

SUBMISSION
October 31, 2024

NOTIFICATION
November 30, 2024

PUBLICATION
December 31, 2024

    
HOME   About IJCSS   Editorial Board   Call For Papers/Editors   Submission Guidelines   Citation Report   Issues Archive   Subscribe IJCSS
VIDEO PRESENTATIONS
Visit Video Section to see author video presentations on their publications.
 
 
RESEARCH CENTERS, INSTITUTES & UNIVERSITIES
 
SEE COMPLETE LIST OF PUBLICATIONS
 

IJCSS CITATION IMPACT
5.645

Refer to In-Process Citation Report for IJCSS for complete details.
 
LIST OF JOURNALS
Complete list of Open Access journals with free access its publications.
 
For Inquiries & Fast Response cscpress@cscjournals.org

ISSUE MANUSCRIPTS

VOLUME - 9   ISSUE - 2    
Publication Date - March / April 2015      |       Pages - 11 - 131
Download Complete Issue    (6.02MB)
   
     
     
     
6 Records found in CSC-OpenAccess Library.    
     
     
Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues    
Archana Sharma, Vineet Kansal, R. P. S. Tomar    
Pages - 11 - 21     |    Revised - 01-03-2015     |    Published - 31-03-2015    
Full Text Available  (373.63KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
The Principles of Modern Attacks Analysis for Penetration Tester    
Adam Ali.Zare Hudaib    
Pages - 22 - 84     |    Revised - 01-03-2015     |    Published - 31-03-2015    
Full Text Available  (704.14KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website    
Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah    
Pages - 85 - 95     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (571.31KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Enhancing Pixel Value Difference (PVD) Image Steganography by Using Mobile Phone Keypad (MPK) Coding    
Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara    
Pages - 96 - 107     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (2.68MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Measuring Information Security: Understanding And Selecting Appropriate Metrics    
Perpétus Jacques Houngbo , Joël Toyigbé Hounsou    
Pages - 108 - 120     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (105.2KB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles    
     
     
Image Processing Technique To Detect Fish Disease    
Hitesh Chakravorty, Rituraj Paul, Prodipto Das    
Pages - 121 - 131     |    Revised - 31-03-2015     |    Published - 30-04-2015    
Full Text Available  (1.18MB)    
MORE INFORMATION    
Full Citation   |   Full Text PDF   |   Abstract   |   References   |   Related Articles