Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science and Security

ISSN: 1985--1553
Publisher: Computer Science Journals


ADD TO MY LIST
 
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireless Sensor Networks PDF available

Author(s): David Fotue | Houda Labiod | Thomas Engel
Volume: 6
Issue: 3
Year: 2012
Image Steganography Techniques: An Overview PDF available

Author(s): Nagham Hamid | Abid Yahya | R. Badlishah Ahmad | Osamah M. Al-Qershi
Volume: 6
Issue: 3
Year: 2012
A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences PDF available

Author(s): B.Umamageswari | B.Karthikeyan | T.Nalini
Volume: 6
Issue: 2
Year: 2012
Mining Regular Patterns in Data Streams Using Vertical Format PDF available

Author(s): G. Vijay Kumar | M. Sreedevi | NVS Pavan Kumar
Volume: 6
Issue: 2
Year: 2012
Fuzzy Optimized Metric for Adaptive Network Routing PDF available

Author(s): Ahmad Khader Haboush
Volume: 6
Issue: 2
Year: 2012
Using Learning Vector Quantization in Alert Management of Intrusion Detection System PDF available

Author(s): Amir Azimi Alasti Ahrabi | Kaveh Feyzi | Zahra Atashbar Orang | Hadi Bahrbegi | Elnaz Safarzadeh
Volume: 6
Issue: 2
Year: 2012
A New Steganographic Method for Embedded Image In Audio File PDF available

Author(s): Dalal N. Hmood | Khamael A. Khudhiar | Mohammed S. Altaei
Volume: 6
Issue: 2
Year: 2012
Audio Steganography Coding Using the Discrete Wavelet Transforms PDF available

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
Volume: 6
Issue: 1
Year: 2012
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam) PDF available

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
Volume: 6
Issue: 1
Year: 2012
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages PDF available

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Volume: 6
Issue: 1
Year: 2012
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System PDF available

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Volume: 6
Issue: 1
Year: 2012
Recourse Management Using a Fair Share Scheduler PDF available

Author(s): Suja Cherukullapurath Mana
Volume: 6
Issue: 1
Year: 2012
A Micro-Mobility Management Scheme for Handover and Roaming PDF available

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Volume: 6
Issue: 1
Year: 2012
Algorithem and Programme for Computation of Forces Acting on Line Supports PDF available

Author(s): Abdulaziz Salem Bahaidara
Volume: 6
Issue: 1
Year: 2012
Semantic Massage Addressing based on Social Cloud Actor's Interests PDF available

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
Volume: 6
Issue: 1
Year: 2012
Quality and Distortion Evaluation of Audio Signal by Spectrum PDF available

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
Volume: 6
Issue: 1
Year: 2012
Dynamic Audio-Visual Client Recognition modelling PDF available

Author(s): Tijjani Adam Shuwa, U. Hashim
Volume: 5
Issue: 5
Year: 2011
A Novel Steganography Technique that Embeds Security along with Compression PDF available

Author(s): Anuradha, Nidhi & Rimple
Volume: 5
Issue: 5
Year: 2011
Non-Specialized File Format Extension PDF available

Author(s): Blake W. Ford & Khosrow Kaikhah
Volume: 5
Issue: 5
Year: 2011
Design and Implementation of EZW & SPIHT Image Coder for Virtual Images PDF available

Author(s): Priyanka Singh & Priti Singh
Volume: 5
Issue: 5
Year: 2011
Phishing Website Detection Using Particle Swarm Optimization PDF available

Author(s): Radha Damodaram & Dr.M.L.Valarmathi
Volume: 5
Issue: 5
Year: 2011
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and Huffman Encoding PDF available

Author(s): P.Nithyanandam, T.Ravichandran, N.M.Santron, E. Priyadharshini
Volume: 5
Issue: 5
Year: 2011
Detection of Botnets using Honeypots and P2P Botnets PDF available

Author(s): Rajab Challoo & Raghavendra Kotapalli
Volume: 5
Issue: 5
Year: 2011
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks PDF available

Author(s): Manal AL-Bzoor, Laiali Almazaydeh, Syed S Rizvi
Volume: 5
Issue: 5
Year: 2011
Evaluation of Logistic Regression and Neural Network Model With Sensitivity Analysis on Medical Datasets PDF available

Author(s): Raghavendra B.K. & S.K. Srivatsa
Volume: 5
Issue: 5
Year: 2011
Maintenance of Network Connectivity Across Process Migration PDF available

Author(s): Mehdi Bahrbegi, Hadi Bahrbegi, Amir Azimi Alasti Ahrabi & Elnaz Safarzadeh
Volume: 5
Issue: 5
Year: 2011
Robust Image Watermarking Scheme Based on Wavelet Technique PDF available

Author(s): Aree Ali Mohammed, Haval Mohammed Sidqi
Volume: 5
Issue: 4
Year: 2011
A proposed Solution: Data Availability and Error Correction in Cloud Computing PDF available

Author(s): Anil Gupta, Parag Pande, Aaftab Qureshi & Vaibhav Sharma
Volume: 5
Issue: 4
Year: 2011
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation PDF available

Author(s): Iwasokun G. B., Akinyokun O. C., Alese B. K. & Olabode O.
Volume: 5
Issue: 4
Year: 2011
A Distributed Approach to Defend Web Service from DDoS Attacks PDF available

Author(s): A Distributed Approach to Defend Web Service from DDoS Attacks
Volume: 5
Issue: 3
Year: 2011
Black Box Backup System PDF available

Author(s): iyad Ahmad Aldasouqi, Arafat Awajan
Volume: 5
Issue: 3
Year: 2011
Finding Relationships Between the Our-NIR Cluster Results PDF available

Author(s): N.Sudhakar Reddy & K.V.N.Sunitha
Volume: 5
Issue: 3
Year: 2011
Development of an Efficient Computing Multilingualism Model for Diacritical Marks in Arabic and Hindi PDF available

Author(s): Abu Sarwar Zamani, Nasser Al Arifi, Md. Mobin Akhtar
Volume: 5
Issue: 3
Year: 2011
Toward a New Algorithm for Hands Free Browsing PDF available

Author(s): Murad Al-Rajab & Haifaa Kattan
Volume: 5
Issue: 3
Year: 2011
Survey Paper: Cryptography Is The Science Of Information Security PDF available

Author(s): Mohammed AbuTaha, Mousa Farajallah, Radwan Tahboub, Mohammad Odeh
Volume: 5
Issue: 3
Year: 2011
Information Security Maturity Model PDF available

Author(s): Information Security Maturity Model
Volume: 5
Issue: 3
Year: 2011
Automatic Detection of Malaria Parasites for Estimating Parasitemia PDF available

Author(s): S. S. Savkare & S. P. Narote
Volume: 5
Issue: 3
Year: 2011
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Projection PDF available

Author(s): Anissa Bouzalmat, Naouar Belghini, Arsalane Zarghili, Jamal Kharroubi & Aicha Majda
Volume: 5
Issue: 3
Year: 2011
Phishing: A Field Experiment PDF available

Author(s): Danuvasin Charoen, Ph.D.
Volume: 5
Issue: 2
Year: 2011
Concurrent Matrix Multiplication on Multi-Core Processors PDF available

Author(s): Muhammad Ali Ismail | Dr. S. H. Mirza | Dr. Talat Altaf
Volume: 5
Issue: 2
Year: 2011
Cryptographic Algorithms for Secure Data Communication PDF available

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011
A New Function-based Framework for Classification and Evaluation of Mutual Exclusion Algorithms PDF available

Author(s): Leila Omrani | Zahra Rafinezhad | Mohammadreza Keyvanpour
Volume: 5
Issue: 2
Year: 2011
A Study of Protocols for Grid Computing Environment PDF available

Author(s): Suresh Jaganathan | Srinivasan A | Damodaram A
Volume: 5
Issue: 2
Year: 2011
Radical Data Compression Algorithm Using Factorization PDF available

Author(s): Zirra Peter Buba | Gregory Maksha Wajiga
Volume: 5
Issue: 2
Year: 2011
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service PDF available

Author(s): Marimuthu K | Ganesh Gopal D
Volume: 5
Issue: 2
Year: 2011
Design and Implementation of a Multi-Agent System for the Job Shop Scheduling Problem PDF available

Author(s): Leila Asadzadeh | Kamran Zamanifar
Volume: 5
Issue: 2
Year: 2011
Three Dimensional Database: Artificial Intelligence to eCommerce Web service Agents PDF available

Author(s): R.Vadivel | Dr K. Baskaran
Volume: 5
Issue: 2
Year: 2011
Diacritic Oriented Arabic Information Retrieval System PDF available

Author(s): Khalid Saleh Aloufi
Volume: 5
Issue: 1
Year: 2011
RPA Switzerland

RPA Switzerland

Robotic process automation

    

Tango Jona
Tangokurs Rapperswil-Jona