Search this site
Skip to main content
Skip to navigation
International Journal of Computer Science and Information Security
IJCSIS
Editorial Board
Call for Editors
Contact IJCSIS
Call for Papers Topics 2024-2025
Computer Science
Animation and Virtual Reality
Biometrics and Pattern Recognition
Cloud and Big Data Analytics
Cloud Computing Security
Cloud Services and Networks
Communication Technologies
Computer Networks
Computer Vision
Data Mining
Data Warehouse
Digital Image Processing
Enterprise Systems
Forensics Computing and Security
Green and Sustainable Computing
Information Processing
Information Security
Smart Learning Environments
Interaction Science
Computer Science
Cloud Computing
Applied Informatics
Information Technology
Internet of Things
Mathematical/Analytical Modelling and Computer Simulation
Mobile Wireless Sensor Networks
Multimedia Systems
Network Security and Privacy
Next Generation Wired/Wireless Advanced Networks and Systems
Parallel and Distributed Systems
Security Trust and Privacy
Pervasive Computing
Social and Mobile Connected Smart Objects
Software Engineering
Wireless Sensor Networks
Software Security
All Volumes & Issues
Vol. 21 No. 6 JUN 2023
Vol. 21 No. 5 MAY 2023
Vol. 21 No. 4 APR 2023
Vol. 21 No. 3 MAR 2023
Vol. 21 No. 2 FEB 2023
Vol. 21 No. 1 JAN 2023
Vol. 20 No. 2 FEB 2022
Vol. 20 No. 1 JAN 2022
Vol. 19 No. 12 DEC 2021
Vol. 19 No. 11 NOV 2021
Vol. 19 No. 10 OCT 2021
Vol. 19 No. 9 SEP 2021
Vol. 19 No. 8 AUG 2021
Vol. 19 No. 7 JUL 2021
Vol. 19 No. 6 JUN 2021
Vol. 19 No. 5 MAY 2021
Vol. 19 No. 4 APR 2021
Vol. 19 No. 3 MAR 2021
Vol. 19 No. 2 FEB 2021
Vol. 19 No. 1 JAN 2021
Vol. 18 No. 12 DEC 2020
Vol. 18 No. 11 NOV 2020
Vol. 18 No. 10 OCT 2020
Vol. 18 No. 9 SEP 2020
Vol. 18 No. 8 AUG 2020
Vol. 18 No. 7 JULY 2020
Vol. 18 No. 6 JUN 2020
Vol. 18 No. 5 MAY 2020
Vol. 18 No. 4 APR 2020
Vol. 18 No. 3 MAR 2020
Vol. 18 No. 2 FEB 2020
Vol. 18 No. 1 JAN 2020
Vol. 17 No. 12 DEC 2019
Vol. 17 No. 11 NOV 2019
Vol. 17 No. 10 OCT 2019
Vol. 17 No. 9 SEP 2019
Vol. 17 No. 8 AUG 2019
Vol. 17 No. 7 JULY 2019
Vol. 17 No. 6 JUNE 2019
Vol. 17 No. 5 MAY 2019
Vol. 17 No. 4 APR 2019
Vol. 17 No. 3 MAR 2019
Vol. 17 No. 2 FEB 2019
Vol. 17 No. 1 JAN 2019
Vol. 16 No. 12 DEC 2018
Vol. 16 No. 11 NOV 2018
Vol. 16 No. 10 OCT 2018
Vol. 16 No. 9 SEP 2018
Vol. 16 No. 8 AUG 2018
Vol. 16 No. 7 JULY 2018
Vol. 16 No. 6 JUNE 2018
Vol. 16 No. 5 MAY 2018
Vol. 16 No. 4 APR 2018
Vol. 16 No. 3 MAR 2018
Vol. 16 No. 2 FEB 2018
Vol. 16 No. 1 JAN 2018
Vol. 15 No. 12 DEC 2017
Vol. 15 No. 11 NOV 2017
Vol. 15 No. 10 OCT 2017
Vol. 15 No. 9 SEP 2017
Vol. 15 No. 8 AUG 2017
Vol. 15 No. 7 JUL 2017
Vol. 15 No. 6 JUN 2017
Vol. 15 No. 5 MAY 2017
Vol. 15 No. 4 APR 2017
Vol. 15 No. 3 MAR 2017
Vol. 15 No. 2 FEB 2017
Vol. 15 No. 1 JAN 2017
Vol. 14 VirtualCom 2016
Vol. 14 CIC 2016
Vol 14 ICETCSE 2016
Vol. 14 No. 12 DEC 2016
Vol. 14 No. 11 NOV 2016
Vol. 14 No. 10 OCT 2016
Vol. 14 No. 9 SEP 2016
Vol. 14 No. 8 AUG 2016
Vol. 14 No. 7 JUL 2016
Vol. 14 No. 6 JUN 2016
Vol. 14 No. 5 MAY 2016
Vol. 14 No. 4 APR 2016
Vol. 14 No. 3 MAR 2016
Vol. 14 Special FEB 2016
Vol. 14 No. 2 FEB 2016
Vol. 14 No. 1 JAN 2016
Vol. 13 No. 12 DEC 2015
Vol. 13 No. 11 NOV 2015
Vol. 13 No. 10 OCT 2015
Vol. 13 No. 9 SEP 2015
Vol. 13 No. 8 AUG 2015
Vol. 13 No. 7 JUL 2015
Vol. 13 No. 6 JUN 2015
Vol. 13 No. 5 MAY 2015
Vol. 13 No. 4 APR 2015
Vol. 13 No. 3 MAR 2015
Vol. 13 No. 2 FEB 2015
Vol. 13 No. 1 JAN 2015
Vol. 12 No. 12 DEC 2014
Vol. 12 No. 11 NOV 2014
Vol. 12 No. 10 OCT 2014
Vol. 12 No. 9 SEP 2014
Vol. 12 No. 8 AUG 2014
Vol. 12 No. 7 JUL 2014
Vol. 12 No. 6 JUN 2014
Vol. 12 No. 5 MAY 2014
Vol. 12 No. 4 APR 2014
Vol. 12 No. 3 MAR 2014
Vol. 12 No. 2 FEB 2014
Vol. 12 No. 1 JAN 2014
Vol. 11 No. 12 DEC 2013
Vol. 11 No. 11 NOV 2013
Vol. 11 No. 10 OCT 2013
Vol. 11 No. 9 SEP 2013
Vol. 11 No. 8 AUG 2013
Vol. 11 No. 7 JUL 2013
Vol. 11 No. 6 JUN 2013
Vol. 11 No. 5 MAY 2013
Vol. 11 No. 4 APR 2013
Vol. 11 No. 3 MAR 2013
Vol. 11 No. 2 FEB 2013
Vol. 11 No. 1 JAN 2013
Vol. 10 No. 12 DEC 2012
Vol. 10 No. 11 NOV 2012
Vol. 10 No. 10 OCT 2012
Vol. 10 No. 9 SEP 2012
Vol. 10 No. 8 AUG 2012
Vol. 10 No. 7 JUL 2012
Vol. 10 No. 6 JUN 2012
Vol. 10 No. 5 MAY 2012
Vol. 10 No. 4 APR 2012
Vol. 10 No. 3 MAR 2012
Vol. 10 No. 2 FEB 2012
Vol. 10 No. 1 JAN 2012
Vol. 9 No. 12 DEC 2011
Vol. 9 No. 11 NOV 2011
Vol. 9 No. 10 OCT 2011
Vol. 9 No. 9 SEP 2011
Vol. 9 No. 8 AUG 2011
Vol. 9 No. 7 JUL 2011
Vol. 9 No. 6 JUN 2011
Vol. 9 No. 5 MAY 2011
Vol. 9 No. 4 APR 2011
Vol. 9 No. 3 MAR 2011
Vol. 9 No. 2 FEB 2011
Vol. 9 No. 1 JAN 2011
Vol. 8 No. 9 DEC 2010
Vol. 8 No. 8 NOV 2010
Vol. 8 No. 7 OCT 2010
Vol. 8 No. 6 SEP 2010
Vol. 8 No. 5 AUG 2010
Vol. 8 No. 4 JUL 2010
Vol. 8 No. 3 JUN 2010
Vol. 8 No. 2 MAY 2010
Vol. 8 No. 1 APR 2010
Vol. 7 No. 3 MAR 2010
Vol. 7 No. 2 FEB 2010
Vol. 7 No. 1 JAN 2010
Vol. 6 No. 3 DEC 2009
Vol. 6 No. 2 NOV 2009
Vol. 6 No. 1 OCT 2009
Vol. 5, SEPTEMBER 2009
Vol. 4, AUGUST 2009
Vol. 3, JULY 2009
Vol. 2, JUNE 2009
Vol.1 Special Issue MAY 2009
Call for Papers July-August 2024
Publication Fee
Call for Papers September-October 2024
Publication Fee
Submit Paper
Notes for Authors
IJCSIS Authors
IJCSIS Best Paper
Special Issues CFP
Conference Partnership
Journal Impact Factor
Google Scholar Alerts
Open Access Journals
Review Process
Reviewers Notes
Reviewers List
SUBSCRIPTIONS
Visit Pittsburgh
What's NEW?
Untitled Post
Untitled Post
Untitled Post
Whats New?
International Journal of Computer Science and Information Security
Untitled Post
Post date: Mar 23, 2011 6:13:44 AM
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse