Vol. 18 No. 6 JUN 2020

Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security

Download Full Journal: [Academia.edu (Full Volume)¦ Scribd (Full Volume)¦ Archive (Full Volume) ¦ SlideShare PDF]

.

Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1. PaperID 01062004: Birds of a Feather Flock Together? A Study of Developers’ Flocking and Migration Behavior in GitHub and Stack Overflow (pp. 1-12)

Sandeep Kaur Kuttal (#1), Michael Mu Sun (#2), Akash Ghosh (#3), Rajesh Sharma (∗4)

(#) Tandy School of Computer Science, University of Tulsa, USA.

(∗) University of Tartu, Estonia.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. PaperID 01062007: CryptoQR System based on RSA (pp. 13-19)

Homam Reda El-Taj, Computing Department, Global College of Engineering and Technology (GCET).

Ruqaiya Alhadhrami, Computing Department, Global College of Engineering and Technology (GCET).

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

3. PaperID 01062014: A Cancelable Biometric Based Security Protocol for Online Banking System (pp. 20-35)

Joshua J. Tom, Mathematics and Computer Science Department, Elizade University, Ilara Mokin, Nigeria.

Boniface K. Alese, Department of Cyber Security Science, The Federal University of Technology, Akure, Nigeria.

Aderonke F. Thompson, Department of Cyber Security Science, The Federal University of Technology, Akure, Nigeria.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

4. PaperID 01062015: Information Security Risk Analysis Using Analytic Hierarchy Process and Fuzzy Comprehensive Evaluation (pp. 36-45)

Aliu Folasade, Ayeni Olaniyi A., Thompson Aderonke F., Alese Boniface K.

School of Computing, The Federal University of Technology, Akure, Nigeria.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

5. PaperID 01062001: Predicting Football Match Results with Data Mining Techniques (pp. 46-55)

(1) Aladesote O. Isaiah, (2) Agbelusi Olutola, (3) Ganiyu Mutiu

(1, 3) Department of Computer Science, Federal Polytechnic, Ile Oluji, Ondo State.

(2) Department of Computer Science, Rufus Giwa Polytechnic, Owo, Ondo State.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

6. PaperID 01062016: Dynamic Three Stages Task Scheduling Algorithm on Cloud Computing (pp. 56-64)

Naglaa Sayed Abdelrehem, Fathi Ahmed Amer, Imane Aly Saroit,

Department of Information Technology, Faculty of Computer and Artificial Intelligence, Cairo University, Cairo, Egypt.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

7. PaperID 01062017: Data-Driven Hydrocarbon Production Forecasting Using Machine Learning Techniques (pp. 65-72)

Masoud Safari Zanjani, Mohammad Abdus Salam, Osman Kandara

Department of Computer Science, Southern University, Baton Rouge, Louisiana, USA.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

8. PaperID 01062022: Development of System Usability Scale (SUS) for the Urdu Language (pp. 73-78)

Hooria Anam, Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan.

Mazhar Sadiq, Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan.

Haris Jamil, Department of Computer Science, COMSATS University Islamabad, Sahiwal, Pakistan.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

9. PaperID 01062024: How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)

Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

10. PaperID 01062025: Tug of Perspectives: Mobile App Users vs Developers (pp. 83-94)

Sandeep Kaur Kuttal (#1), Yiting Bai (#2), Ezequiel Scott (∗3), Rajesh Sharma (∗4),

(#) Tandy School of Computer Science, University of Tulsa, USA.

(∗) University of Tartu, Estonia.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

11. PaperID 01062026: Dissipating with Relations: Implication for the Entity Relationship Model (pp. 95-104)

Sabah Al-Fedaghi, Computer Engineering Department, Kuwait University, Kuwait.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

12. PaperID 01062027: Use of Blockchain in Public Key Infrastructure (PKI): A Systematic Literature Review (pp. 105-111)

Nouf Aldahwan, Department of Information Systems, College of Computer Sciences, King Khalid University, Abha, Saudi Arabia.

Daniyal Alghazzawi, Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

13. PaperID 01062029: An Efficient and Secured AODV Protocol against Black Hole Attacks on Wireless Sensor Networks (pp. 112-119)

Elie T. FUTE (1,2), Audrey T. NANGUE (2), Emmanuel TONYE (3)

(1) University of Buea, Cameroon.

(2) University of Dschang, Cameroon.

(3) University of Yaounde 1, Cameroon.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

14. PaperID 01062032: Automatic Detection of Bullet in Human Body Based on X-Ray Images Using Machine Learning Techniques (pp. 120-125)

Muhammad Imad, Syed Irfan Ullah, Abdus Salam, Wajid Ullah Khan, Farhat Ullah, Muhammad Abul Hassan

Department of Computing and Technology Abasyn University, Peshawar, Pakistan.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

15. PaperID 01062013: A Vision Based Road Blocker Detection and Distance Calculation for Intelligent Vehicles (pp. 126-132)

Farhat Ullah, Syed Irfan Ullah, Abdus Salam, Wajid Ullah Khan, Muhammad Imad, Muhammad Abul Hassan

Department of Computing and Technology Abasyn University, Peshawar, Pakistan.

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

16. PaperID 01062002: Intelligent Real Time Traffic Management (pp. 133-145)

F. Franklin Marie, T. Govardhan, A. V. Ananthalakshmi

Department of ECE, Pondicherry Engineering College

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

17. PaperID 01062019: A Proposed Model for Cybercrime Detection Algorithm Using a Big Data Analytics (pp. 146-153)

Hossam Abdel Rahaman,

Dept of Computer and Information Sciences, Faculty of Statistical Studies and Research, Cairo University, Egypt

Full Text: PDF [Academia.edu | Scopus | Google Scholar | Archive | ProQuest]

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

The Journal of Computer Science and Information Security is an Open Access journal since 2009 with high citations in Google Scholar. ESCI - IP & Science - Thomson Reuters - Web of Science (Indexing in process) & Scopus.

ISSN 1947 5500 Copyright © IJCSIS, USA.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------