Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 9 ISSUE - 5 | ||||
Publication Date - September / October 2015 | Pages - 225 - 279 Download Complete Issue (1.59MB) |
||||
6 Records found in CSC-OpenAccess Library. | ||||
A Mitigation Technique For Internet Security Threat of Toolkits Attack | ||||
Francisca Nonyelum Ogwueleka, Edward Onyebueke Agu | ||||
Pages - 225 - 237 | Revised - 31-08-2015 | Published - 30-09-2015 | ||||
Full Text Available (237.86KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
OpenGL Based Testing Tool Architecture for Exascale Computing | ||||
Muhammad Usman Ashraf, Fathy Elbouraey Eassa | ||||
Pages - 238 - 244 | Revised - 31-08-2015 | Published - 30-09-2015 | ||||
Full Text Available (298.65KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Hybrid Model Based Testing Tool Architecture for Exascale Computing System | ||||
Muhammad Usman Ashraf, Fathy Elbouraey Eassa | ||||
Pages - 245 - 252 | Revised - 31-08-2015 | Published - 30-09-2015 | ||||
Full Text Available (167.43KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Biclustering using Parallel Fuzzy Approach for Analysis of Microarray Gene Expression Data | ||||
Dwitiya Tyagi-Tiwari, Sujoy Das, Manoj Jha, Namita Srivastava | ||||
Pages - 253 - 265 | Revised - 31-08-2015 | Published - 30-09-2015 | ||||
Full Text Available (162.49KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Managing Intrusion Detection Alerts Using Support Vector Machines | ||||
Majid Ghonji Feshki, Omid Sojoodi, Minoo Deljavan Anvary | ||||
Pages - 266 - 273 | Revised - 30-09-2015 | Published - 31-10-2015 | ||||
Full Text Available (119.81KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Review of Feature Model Position in the Software Product Line and Its Extraction Methods | ||||
Saba Pedram, Mehran Mohsenzadeh, Amir Azimi Alasti Ahrabi | ||||
Pages - 274 - 279 | Revised - 30-09-2015 | Published - 31-10-2015 | ||||
Full Text Available (61.87KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||