Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Home
About NCS
Publications
Journal of Computer Science and Its Applications
Journal of Information Security, Privacy and Digital Forensics
Conference Proceedings
Technical Reports
Downloads
Journal Subscription
Category:
JCSA
Home
/
Category:
JCSA
Order By:
Publish Date
Title
Update Date
Downloads
Views
Order:
Descending
Ascending
Apply Filter
A Trustworthy SMS Based Voting System Architecture
1 file(s)
1.24 MB
Download
A SECURED PROTOCOL FOR PREVENTING ONLINE DICTIONARY ATTACK
1 file(s)
777.91 KB
Download
A Generic Maximum Delay Model of a Packet Switch
1 file(s)
239.04 KB
Download
A Conceptual Trust Model for Managing E-Commerce Environment
1 file(s)
2.07 MB
Download
A PROMETHEE BASED EVALUATION OF SOFTWARE DEFECT PREDICTORS
1 file(s)
267.41 KB
Download
PERCEPTION OF SECURITY INDICATORS IN ONLINE SITES
1 file(s)
7.53 MB
JCSA/V19N1/JUNE2012/01
BLACK-BOX OPTIMIZATION BENCHMARKING OF PRCGA ON NOISY TESTBED
1 file(s)
2.14 MB
JCSA/V20N2/DECEMBER2013/08
THE DESIGN OF A WEB – BASED INTEGRATED LIBRARY SYSTEM WITH INTERNET SECURITY SOLUTION
1 file(s)
1.37 MB
JCSA/V20N2/DECEMBER2013/07
NATURAL LANGUAGE PROCESSING TECHNIQUES FOR AUTOMATIC TEST QUESTIONS GENERATION USING DISCOURSE CONNECTIVES
1 file(s)
715.11 KB
JCSA/V20N2/DECEMBER2013/06
A WEB-BASED PLATFORM FOR MOBILE LEARNING MANAGEMENT SYSTEM
1 file(s)
753.35 KB
JCSA/V20N2/DECEMBER2013/05
AN EFFICIENT IMAGE CRYPTOSYSTEM BASED ON WOLFRAM SEQUENCE AND RNS
1 file(s)
915.19 KB
JCSA/V20N2/DECEMBER2013/04
FUZZY ANALYSIS AND ADAPTIVE ANTHROPOMETRY MODEL FOR OBJECT IDENTIFICATION IN SURVEILLANCE SYSTEM
1 file(s)
28.00 KB
JCSA/V20N2/DECEMBER2013/03
FORMAL STRUCTURES FOR EXTRACTING ANALYTICALLY JUSTIFIABLE DECISIONS FROM A SET OF AMBIGUOUS KEY PERFORMANCE INDICATORS
1 file(s)
1.79 MB
JCSA/V20N2/DECEMBER2013/02
EMPLOYING BOTH DESCRIPTIVE AND PREDICTIVE ALGORITHMS TOWARD IMPROVING PREDICTION ACCURACY
1 file(s)
421.93 KB
JCSA/V20N2/DECEMBER2013/01
AANtID: AN ALTERNATIVE APPROACH TO NETWORK INTRUSION DETECTION
1 file(s)
638.18 KB
JCSA/V23N1/JUNE2016/12
1
2
…
9
10
11
12
13
14