Vol. 17 No. 5 MAY 2019

Vol. 17 No. 5 May 2019 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu (Full Volume)¦ Scribd (Full Volume)¦ Archive (Full Volume) ¦ SlideShare PDF]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. PaperID 30041902: Implementation of a Decision System for a Suitable IT Governance Framework (pp. 1-7)

Ibrahim HAMZANE, Information Technology and Modelization Lab (LTIM), Hassan II University Mohammedia, Casablanca, Morocco

Abdessamad BELANGOUR, Information Technology and Modelization Lab (LTIM), Hassan II University Mohammedia, Casablanca, Morocco

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. PaperID 30041903: Palm Vein Feature Extraction Method by Using Optimized DVHLocal Binary Pattern (pp. 8-12)

Dini Fronitasari, Basari & Dadang Gunawan

Department of Electrical of Engineering, Universitas Indonesia, Depok, Indonesia

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. PaperID 30041904: A Novel Framework to Improve Secure Digital Library at Cloud Environment (pp. 13-22)

Heba Sayed, Hesham N. Elmahdy, Fathy Amer, Sherif Shaheen

Faculty of Computers and Artificial Intelligence, Faculty of Arts, Cairo, University

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. PaperID 30041905: Botnet Detection and Prevention in Software Defined Networks (SDN) using DNS Protocol (pp. 23-65)

Muhammad Junaid Zafar, Riphah International University, Islamabad, Pakistan

Professor Dr. Muhammad Zubair, Riphah International University, Islamabad, Pakistan

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. PaperID 30041906: An Improved Approach for Monitoring and Controlling of Flyovers and Bridges Using Internet of Things (pp. 66-70)

K. S. F. Azam, D. M. Abdullah, Md. M. Rahman, Md. S. Bari

Department of Computer Science & Engineering, Primeasia University, Dhaka, Bangladesh

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. PaperID 30041907: QoS Based Scheduling Techniques in Cloud Computing: Systematic Review (pp. 71-88)

Monika, Om Prakash Sangwan,

Guru Jambheshwar University of Science & Technology, Hisar, Haryana

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. PaperID 30041910: Selecting Prominent API Calls and Labeling Malicious Samples for Effective Malware Family Classification (pp. 89-105)

Cho Cho San & Mie Mie Su Thwin

Cyber Security Research Lab, University of Computer Studies, Yangon, Myanmar

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. PaperID 30041917: Text Extraction System by Eliminating Non-Text Regions (pp. 106-111)

S. Shiyamala & S. Suganya,

Department of Computer Science, Rathnavel Subramaniam College of Arts and Science, Coimbatore, TN, India

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. PaperID 30041925: Optimizing Bigdata Processing by using Hybrid Hierarchically Distributed Data Matrix (pp. 112-124)

K. L. S. Soujanya (a), B. Shirisha (b), Challa Madhavi Latha (c)

(a) Professor, Department of CSE,CMR College of Engineering & Technology, Hyderabad, India.

(b) M .Tech Student, Department of CSE,CMR College of Engineering & Technology, Hyderabad, India.

(c) Assistant Professor, Department of Information Technology, Faculty of Informatics, University of Gondar, Gondar, Ethiopia

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. PaperID 30041942: Design and Analysis of M-Shape Microstrip Patch Antenna for Wireless Communications (pp. 125-129)

Muhammad Afsar Uddin, Department of Computer Science & Engineering, Z.H. Sikder University of Science & Technology, Shariatpur, Bangladesh

Fatama Akter, Department of Computer Science & Engineering, Z.H. Sikder University of Science & Technology, Shariatpur, Bangladesh

Md. Zahid Hossain, Assistant Maintenance Engineer (Hardware) Dhaka WASA, Dhaka, Bangladesh

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. PaperID 30041943: Children Cognitive Load Analysis in Affordance-based Interaction (pp. 130-134)

Syed Asim Ali, Department of Computer Science, University of Karachi, Pakistan -75270, Pakistan

Areeba Hafeez, Institute of Business Administration, Computer Science, Karachi-74400, Pakistan

Shereen Akram, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan

Muhammad Affan Khan, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan

Afshan Ejaz, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan

Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The journal of Computer Science and Information Security is an Open Access journal since 2009 with high citations in Google Scholar. ESCI - IP & Science - Thomson Reuters - Web of Science (Indexing in process) & Scopus.

ISSN 1947 5500 Copyright © IJCSIS, USA.