Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription
Logo
  • Home
  • About NCS
  • Publications
    • Journal of Computer Science and Its Applications
    • Journal of Information Security, Privacy and Digital Forensics
    • Conference Proceedings
    • Technical Reports
    • Downloads
  • Journal Subscription

Category: JCSA

Home / Category: JCSA
Icon

A Trustworthy SMS Based Voting System Architecture

1 file(s) 1.24 MB
Download
Icon

A SECURED PROTOCOL FOR PREVENTING ONLINE DICTIONARY ATTACK

1 file(s) 777.91 KB
Download
Icon

A Generic Maximum Delay Model of a Packet Switch

1 file(s) 239.04 KB
Download
Icon

A Conceptual Trust Model for Managing E-Commerce Environment

1 file(s) 2.07 MB
Download
Icon

A PROMETHEE BASED EVALUATION OF SOFTWARE DEFECT PREDICTORS

1 file(s) 267.41 KB
Download
Icon

PERCEPTION OF SECURITY INDICATORS IN ONLINE SITES

1 file(s) 7.53 MB
JCSA/V19N1/JUNE2012/01
Icon

BLACK-BOX OPTIMIZATION BENCHMARKING OF PRCGA ON NOISY TESTBED

1 file(s) 2.14 MB
JCSA/V20N2/DECEMBER2013/08
Icon

THE DESIGN OF A WEB – BASED INTEGRATED LIBRARY SYSTEM WITH INTERNET SECURITY SOLUTION

1 file(s) 1.37 MB
JCSA/V20N2/DECEMBER2013/07
Icon

NATURAL LANGUAGE PROCESSING TECHNIQUES FOR AUTOMATIC TEST QUESTIONS GENERATION USING DISCOURSE CONNECTIVES

1 file(s) 715.11 KB
JCSA/V20N2/DECEMBER2013/06
Icon

A WEB-BASED PLATFORM FOR MOBILE LEARNING MANAGEMENT SYSTEM

1 file(s) 753.35 KB
JCSA/V20N2/DECEMBER2013/05
Icon

AN EFFICIENT IMAGE CRYPTOSYSTEM BASED ON WOLFRAM SEQUENCE AND RNS

1 file(s) 915.19 KB
JCSA/V20N2/DECEMBER2013/04
Icon

FUZZY ANALYSIS AND ADAPTIVE ANTHROPOMETRY MODEL FOR OBJECT IDENTIFICATION IN SURVEILLANCE SYSTEM

1 file(s) 28.00 KB
JCSA/V20N2/DECEMBER2013/03
Icon

FORMAL STRUCTURES FOR EXTRACTING ANALYTICALLY JUSTIFIABLE DECISIONS FROM A SET OF AMBIGUOUS KEY PERFORMANCE INDICATORS

1 file(s) 1.79 MB
JCSA/V20N2/DECEMBER2013/02
Icon

EMPLOYING BOTH DESCRIPTIVE AND PREDICTIVE ALGORITHMS TOWARD IMPROVING PREDICTION ACCURACY

1 file(s) 421.93 KB
JCSA/V20N2/DECEMBER2013/01
Icon

AANtID: AN ALTERNATIVE APPROACH TO NETWORK INTRUSION DETECTION

1 file(s) 638.18 KB
JCSA/V23N1/JUNE2016/12
  • 1
  • 2
  • …
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
Copyright © 2020 Nigeria Computer Society. All Rights Reserved
  • Follow us