All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Journal of Global Research in Computer Sciences : Citations & Metrics Report

Important citations (766)
image Almotiri sh. integrated fuzzy based computational mechanism for the selection of effective malicious traffic detection approach. ieee access. 2021 jan 8;9:10751-64.
image Bianchi aj. processamento de áudio em tempo real em plataformas computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de sao paulo).
image Alojaiman b. toward selection of trustworthy and efficient e-learning platform. ieee access. 2021 sep 20;9:133889-901.
image Bianchi aj. processamento de áudio em tempo real em dispositivos computacionais de alta disponibilidade e baixo custo (doctoral dissertation, universidade de são paulo).
image Ahmad m, al-amri jf, subahi af, khatri s, seh ah, nadeem m, agrawal a. healthcare device security assessment through computational methodology. computer systems science and engineering. 2022 jan 1;41(2):811-28.
image Bianchi aj, queiroz m. on the performance of real-time dsp on android devices. inproceedings of the 9th sound and music computing conference 2012 (pp. 113-120).
image Alenezi m. ontology-based context-sensitive software security knowledge management modeling. int j electr comput eng. 2020 dec;10(6):6507-20.
image Kanojiya a, nagori v. analysis of architecture and forms of outputs of decision support systems implemented for different domains. in2018 second international conference on inventive communication and computational technologies (icicct) 2018 apr 20 (pp. 346-350). ieee.
image Rizvi s, mitchell j, showan n. analysis of security vulnerabilities and threat assessment in cognitive radio (cr) networks. in2014 ieee 8th international conference on application of information and communication technologies (aict) 2014 oct 15 (pp. 1-6). ieee.
image Khan mw, pandey d, khan sa. critical review on software testing: security perspective. ininternational conference on smart trends for information technology and computer communications 2016 aug 6 (pp. 714-723). springer, singapore.
image Al-zahrani fa. evaluating the usable-security of healthcare software through unified technique of fuzzy logic, anp and topsis. ieee access. 2020 jun 12;8:109905-16.
image Singla r. a literature survey on mood detection system. international journal of computer science and information technologies. 2016;7(1):6-10.
image Khari m, kumar p. embedding security in software development life cycle (sdlc). in2016 3rd international conference on computing for sustainable global development (indiacom) 2016 mar 16 (pp. 2182-2186). ieee.
image Li s, li x, hao j, an b, feng z, chen k, zhang c. defending against man-in-the-middle attack in repeated games. inijcai 2017 jan 1 (pp. 3742-3748).
image Kumar r, khan sa, khan ra. revisiting software security: durability perspective. international journal of hybrid information technology. 2015 feb;8(2):311-22.
image Gulraj m, ahmad n. mood detection of psychological and mentally disturbed patients using machine learning techniques. international journal of computer science and network security (ijcsns). 2016 aug 1;16(8):63.
image Gajbhiye s, karmakar s, sharma m, sharma s. bluetooth secure simple pairing with enhanced security level. journal of information security and applications. 2019 feb 1;44:170-83.
image Varsha hs. a review of region growing and image segmentation techniques.
image Benson cc, lajish vl, rajamani k. a novel skull stripping and enhancement algorithm for the improved brain tumor segmentation using mathematical morphology. international journal of image, graphics and signal processing. 2016 jul 1;8(7):59.
image Muniyappan s, rajendran p. contrast enhancement of medical images through adaptive genetic algorithm (aga) over genetic algorithm (ga) and particle swarm optimization (pso). multimedia tools and applications. 2019 mar;78(6):6487-511.