Vol. 17 No. 5 MAY 2019
Vol. 17 No. 5 May 2019 International Journal of Computer Science and Information Security
Download Full Journal: [Academia.edu (Full Volume)¦ Scribd (Full Volume)¦ Archive (Full Volume) ¦ SlideShare PDF]
.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. PaperID 30041902: Implementation of a Decision System for a Suitable IT Governance Framework (pp. 1-7)
Ibrahim HAMZANE, Information Technology and Modelization Lab (LTIM), Hassan II University Mohammedia, Casablanca, Morocco
Abdessamad BELANGOUR, Information Technology and Modelization Lab (LTIM), Hassan II University Mohammedia, Casablanca, Morocco
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. PaperID 30041903: Palm Vein Feature Extraction Method by Using Optimized DVHLocal Binary Pattern (pp. 8-12)
Dini Fronitasari, Basari & Dadang Gunawan
Department of Electrical of Engineering, Universitas Indonesia, Depok, Indonesia
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. PaperID 30041904: A Novel Framework to Improve Secure Digital Library at Cloud Environment (pp. 13-22)
Heba Sayed, Hesham N. Elmahdy, Fathy Amer, Sherif Shaheen
Faculty of Computers and Artificial Intelligence, Faculty of Arts, Cairo, University
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. PaperID 30041905: Botnet Detection and Prevention in Software Defined Networks (SDN) using DNS Protocol (pp. 23-65)
Muhammad Junaid Zafar, Riphah International University, Islamabad, Pakistan
Professor Dr. Muhammad Zubair, Riphah International University, Islamabad, Pakistan
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. PaperID 30041906: An Improved Approach for Monitoring and Controlling of Flyovers and Bridges Using Internet of Things (pp. 66-70)
K. S. F. Azam, D. M. Abdullah, Md. M. Rahman, Md. S. Bari
Department of Computer Science & Engineering, Primeasia University, Dhaka, Bangladesh
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. PaperID 30041907: QoS Based Scheduling Techniques in Cloud Computing: Systematic Review (pp. 71-88)
Monika, Om Prakash Sangwan,
Guru Jambheshwar University of Science & Technology, Hisar, Haryana
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. PaperID 30041910: Selecting Prominent API Calls and Labeling Malicious Samples for Effective Malware Family Classification (pp. 89-105)
Cho Cho San & Mie Mie Su Thwin
Cyber Security Research Lab, University of Computer Studies, Yangon, Myanmar
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. PaperID 30041917: Text Extraction System by Eliminating Non-Text Regions (pp. 106-111)
S. Shiyamala & S. Suganya,
Department of Computer Science, Rathnavel Subramaniam College of Arts and Science, Coimbatore, TN, India
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. PaperID 30041925: Optimizing Bigdata Processing by using Hybrid Hierarchically Distributed Data Matrix (pp. 112-124)
K. L. S. Soujanya (a), B. Shirisha (b), Challa Madhavi Latha (c)
(a) Professor, Department of CSE,CMR College of Engineering & Technology, Hyderabad, India.
(b) M .Tech Student, Department of CSE,CMR College of Engineering & Technology, Hyderabad, India.
(c) Assistant Professor, Department of Information Technology, Faculty of Informatics, University of Gondar, Gondar, Ethiopia
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. PaperID 30041942: Design and Analysis of M-Shape Microstrip Patch Antenna for Wireless Communications (pp. 125-129)
Muhammad Afsar Uddin, Department of Computer Science & Engineering, Z.H. Sikder University of Science & Technology, Shariatpur, Bangladesh
Fatama Akter, Department of Computer Science & Engineering, Z.H. Sikder University of Science & Technology, Shariatpur, Bangladesh
Md. Zahid Hossain, Assistant Maintenance Engineer (Hardware) Dhaka WASA, Dhaka, Bangladesh
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. PaperID 30041943: Children Cognitive Load Analysis in Affordance-based Interaction (pp. 130-134)
Syed Asim Ali, Department of Computer Science, University of Karachi, Pakistan -75270, Pakistan
Areeba Hafeez, Institute of Business Administration, Computer Science, Karachi-74400, Pakistan
Shereen Akram, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan
Muhammad Affan Khan, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan
Afshan Ejaz, Institute of Business Administration, Computer Science, Karachi -74400, Pakistan
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | ProQuest]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
The journal of Computer Science and Information Security is an Open Access journal since 2009 with high citations in Google Scholar. ESCI - IP & Science - Thomson Reuters - Web of Science (Indexing in process) & Scopus.