|
|
|
ABOUT IJCSS |
International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.
By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.
IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications
IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.
|
|
|
|
RANDOMLY SELECTED PAPERS |
|
|
Online Transaction Fraud Detection using Hidden Markov Model & Behavior Analysis |
|
|
Niki Patel, Yanyan Li, Ahmad Reza Hadaegh |
|
Computer Science and Information System, California State University San Marcos, San Marcos, 92096 - United States of America |
|
|
|
|
|
MVC Architecture from Maintenance Quality Attributes Perspective |
|
|
Safia Nahhas |
|
Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21577 - Saudi Arabia |
|
|
|
|
|
Interplay of Digital Forensics in eDiscovery |
|
|
Sundar Krishnan, Narasimha Shashidhar |
|
Department of Computer Science, Sam Houston State University, Huntsville, TX - United States of America |
|
|
|
|
|
A Systematic Review of Android Malware Detection
Techniques |
|
|
Faris Auid Alharbi, Abdurhman Mansour Alghamdi, Ahmed S Alghamdi |
|
Faculty of Computer Science and Engineering/Cybersecurity, University of Jeddah, Jeddah, 23468, P.O.Box: 4053 - Saudi Arabia |
|
|
|
|
|
The Internet of Things: Architecture, Security Threats, and Risk Mitigation Techniques |
|
|
Eric Brown, Mohammed Ketel |
|
Applied Information Technology, University of Baltimore, Baltimore, Maryland - United States of America |
|
|
|
|
|
Security Behavior Intention of Employees with Hearing Difficulties: An Empirical Comparison Study |
|
|
Wisdom Umeugo |
|
University of the Cumberlands, Independent Researcher, Ottawa - Canada |
|
|
|
|
|
Software Architecture Erosion: Impacts, Causes, and Management |
|
|
Sharon Andrews, Mark Sheppard |
|
Software Engineering, University of Houston Clear Lake, Houston, TX 77058 - United States of America |
|
|
|
|
|
|