Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)

International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2025
|
|||||
| ARTICLE PROCESSING CHARGES (APC) TIER#1: $150 | TIER#2: $100. See more details. |
|||||

| HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
||||||||||||||||||||||||||||||||
ISSUE MANUSCRIPTS
| VOLUME - 9 ISSUE - 2 | ||||
| Publication Date - March / April 2015 | Pages - 11 - 131 Download Complete Issue |
||||
| 6 Records found in CSC-OpenAccess Library. | ||||
| Location Based Services in M-Commerce: Customer Trust and Transaction Security Issues | ||||
| Archana Sharma, Vineet Kansal, R. P. S. Tomar | ||||
| Pages - 11 - 21 | Revised - 01-03-2015 | Published - 31-03-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| The Principles of Modern Attacks Analysis for Penetration Tester | ||||
| Adam Ali.Zare Hudaib | ||||
| Pages - 22 - 84 | Revised - 01-03-2015 | Published - 31-03-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| An Investigation of Using Privilege Level System to Restrict Employers for Using Unpermitted Website | ||||
| Roza Hikmat Hama Aziz, Miran Hikmat Mohammed Baban, Ako Muhammad Abdullah | ||||
| Pages - 85 - 95 | Revised - 31-03-2015 | Published - 30-04-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Enhancing Pixel Value Difference (PVD) Image Steganography by Using Mobile Phone Keypad (MPK) Coding | ||||
| Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara | ||||
| Pages - 96 - 107 | Revised - 31-03-2015 | Published - 30-04-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Measuring Information Security: Understanding And Selecting Appropriate Metrics | ||||
| Perpétus Jacques Houngbo , Joël Toyigbé Hounsou | ||||
| Pages - 108 - 120 | Revised - 31-03-2015 | Published - 30-04-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
| Image Processing Technique To Detect Fish Disease | ||||
| Hitesh Chakravorty, Rituraj Paul, Prodipto Das | ||||
| Pages - 121 - 131 | Revised - 31-03-2015 | Published - 30-04-2015 | ||||
| Full Text Available |
||||
| MORE INFORMATION | ||||
| Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
