|
|
|
ABOUT IJCSS |
International Journal of Computer Science and Security (IJCSS) is a peer review open access journal publishing the state of the art research in computer science and computer security technologies. IJCSS considers any material dealing primarily with the technological aspects of computer science and computer security. Subjects covered include: computer engineering, computer graphics, computer networks, computer security, cryptography, operating systems, programming languages, theory, design, implementation, analysis and many other topics relevant to computer science and security.
By publishing the original research papers & industrial experience-analysis studies and reports, the journal is targeted to be read by developers, designers, computer engineers, software engineers, academics, scholars, advanced students, practitioners, and computer security themes.
IJCSS invite specialists, researchers, scientists, designers, computer engineers, software engineers, academics, scholars from the fields of computer science and computer security to share their understanding and contributions towards scientific applications
IJCSS intends to provide its researchers and academics the latest and remarkable researches made by different scientists and industrial experts by providing free access to the published articles.
|
|
|
|
RANDOMLY SELECTED PAPERS |
|
|
Interplay of Digital Forensics in eDiscovery |
|
|
Sundar Krishnan, Narasimha Shashidhar |
|
Department of Computer Science, Sam Houston State University, Huntsville, TX - United States of America |
|
|
|
|
|
A Review on Library Fuzzing Tools |
|
|
Jia Song |
|
Computer Science Department, University of Idaho, Moscow, Idaho, 83844 - United States of America |
|
|
|
|
|
Design and Implementation of a Predictive Model for Nigeria Local Football League |
|
|
ADEBISI John, ALABI Damilola |
|
Engineering/Computer, University of Namibia, Ongwediva - Namibia |
|
|
|
|
|
A Method of Constructing Balanced Repeated Measurement Designs for First Order Residual Effects in Information Security |
|
|
Chen-Chi Shing, Lee-Hur Shing |
|
School of Computer Science and Information Systems, Radford University, Radford, VA 24142 - United States of America |
|
|
|
|
|
Software Architecture Erosion: Impacts, Causes, and Management |
|
|
Sharon Andrews, Mark Sheppard |
|
Software Engineering, University of Houston Clear Lake, Houston, TX 77058 - United States of America |
|
|
|
|
|
A Systematic Review of Android Malware Detection
Techniques |
|
|
Faris Auid Alharbi, Abdurhman Mansour Alghamdi, Ahmed S Alghamdi |
|
Faculty of Computer Science and Engineering/Cybersecurity, University of Jeddah, Jeddah, 23468, P.O.Box: 4053 - Saudi Arabia |
|
|
|
|
|
Security Behavior Intention of Employees with Hearing Difficulties: An Empirical Comparison Study |
|
|
Wisdom Umeugo |
|
University of the Cumberlands, Independent Researcher, Ottawa - Canada |
|
|
|
|
|
|