Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Jordan"

Total 94 records found in CSC-OpenAccess Library.
Page 1 of 5    Next
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Eng. Mohanned Hassan Momani, Adam Ali.Zare Hudaib
Information & Cyber Security Expert Licensed penetration tester L|PT Sweden
Pages - 159 - 176     |    Revised - 10-07-2014     |    Published - 10-08-2014
Volume - 8,   Issue - 4, International Journal of Computer Science and Security (IJCSS)
Using GIS in Designing and Deploying Wireless Network in City Plans
Iyad Ahmad Aldasouqi, Walid A.Salameh
Royal Scientific Society The Middle East Scientific Institute for Security
Pages - 66 - 75     |    Revised - 01-06-2014     |    Published - 01-07-2014
Volume - 6,   Issue - 4, International Journal of Computer Networks (IJCN)
DNS Advanced Attacks and Analysis
Adam Ali.Zare Hudaib, Esra'a Ali Zare Hudaib
Two Mas ltd
Pages - 63 - 74     |    Revised - 31-03-2014     |    Published - 30-04-2014
Volume - 8,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
Blank Background Image Lossless Compression Technique
Samer Sawalha , Arafat Awajan
Princess Sumaya University for Technology
Pages - 9 - 16     |    Revised - 20-01-2014     |    Published - 11-02-2014
Volume - 8,   Issue - 1, International Journal of Image Processing (IJIP)
Up/Down Converter Linear Model with Feed Forward and Feedback Stability Analysis
Dr. Ziad Sobih, Arvin Grabel
Modern center
Pages - 1 - 10     |    Revised - 31-12-2013     |    Published - 22-01-2014
Volume - 8,   Issue - 1, International Journal of Engineering (IJE)
An Empirical Study on the Security Measurements of Websites of Jordanian Public Universities
Mokhled S. Al-Tarawneh
Mutah University
Pages - 127 - 136     |    Revised - 01-10-2013     |    Published - 01-11-2013
Volume - 7,   Issue - 4, International Journal of Computer Science and Security (IJCSS)
Review on Sorting Algorithms A Comparative Study
Khalid Suleiman Al-Kharabsheh, Ibrahim Mahmoud Al Turani, Abdallah Mahmoud Ibrahim AlTurani, Nabeel Imhammed Zanoon
Albalqa applied university
Pages - 120 - 126     |    Revised - 15-08-2013     |    Published - 15-09-2013
Volume - 7,   Issue - 3, International Journal of Computer Science and Security (IJCSS)
The Impact of Customer Knowledge on the Security of E-Banking
Nabeel Zanoon, Natheer Khleaf Gharaibeh
Aqapa College , Balqa Applied University Aqapa
Pages - 81 - 92     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusive OR Combination
Saleh S Saraireh, Mohammed AL-Saraireh, Yazeed Alsbou
Department of Communications and Electron ic Engineering Philadelphia University Amman
Pages - 66 - 80     |    Revised - 15-05-2013     |    Published - 30-06-2013
Volume - 7,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions