IJCSI Open Access Publications
IJCSI Thesis Publications IJCSI Conference Special Issues Search Publications, Authors, More...
IJCSI Volume 14, Issue 2, March 2017
Sun Shibao, Jia Bowen, Zhang Jingshan, Zhang Yanan, Yan Xiaolong and Yin Lihang
Download Full-Text
Social Engineering Framework: Understanding the Deception Approach to Human Element of Security
Richardus Eko Indrajit
Download Full-Text
Usability Evaluation Method based on ISO/IEC SQuaRE: A Systematic Mapping Study
Tenia Wahyuningrum and Azhari
Download Full-Text
Exploring the Potential of the Innate Immune System for Computers Network Security
Almotasem Bellah Ahmad Alajlouni
Download Full-Text
Rule Based Gujarati Morphological Analyzer
Utkarsh Kapadia and Apurva Desai
Download Full-Text
Cybercrime in Saudi Arabia: fact or fiction?
Sulaiman Al Amro
Download Full-Text
A Method for Normalizing Students Scores Case Study Faculty of Information Technology At Al-Ahliyya Amman University
Khaled Al-Jubori and Mustafa Yaseen
Download Full-Text
Empirical study of project management dimensions: guidelines for an adapted standard to SMEs and large enterprises in developing countries (Moroccan case)
Amina Oukennou, Zitouni Beidouri and Otmane Bouksour
Download Full-Text
A Brief Study of Challenges in Machine Translation
H.Mohamed Zakir and M.Shafeen Nagoor
Download Full-Text
Extended SPINS Framework for Security Wireless Sensor Network
Khalid M. Abdullah, Essam H. Houssein and Hala H. Zayed
Download Full-Text
An Evaluation of Load Balancing between Server Platforms inside a Data Center
Amer Tahseen Abu Jassar
Download Full-Text
The state of IT Governance in Moroccan Public Sector
Naima Nakabi, Hatim Tadili and Alami Semaa
Download Full-Text