Welcome to Bilingual Publishing Group
Page Header
  • Login / Register
Skip to main content Skip to main navigation menu Skip to site footer
Journal of Computer Science Research
  • Home
  • About the Journal
    • Aims and Scope
    • Open Access Policy
    • Indexing & Archiving
    • Peer Review Process
    • Publishing Ethics
    • Article Processing Charges
    • Correction & Withdrawal Policy
    • Copyright Policy
    • Advertising Policy
    • Contact
  • All Issues
  • Author Guidelines
  • Editorial Board
Apply for Editorial Board Submit an Article

Member of ALPSP

Most Viewed
  • Review of Artificial Intelligence with Retailing Sector
    4425
  • Secure Remote Access IPSEC Virtual Private Network to University Network System
    2910
  • Design of Intelligent Home Security Alarm System under STC89C51 Single Chip Microcomputer
    2768
  • Machine Learning Approach to Mobile Forensics Framework for Cyber Crime Detection in Nigeria
    1985
  • Quality Models for Open, Flexible, and Online Learning
    1984
Tweets by @bilingual_pub
  1. Home /
  2. Search

Search

Advanced filters
Published After
Published Before

Search Results

Found 4 items.
  • Optimization of Secure Coding Practices in SDLC as Part of Cybersecurity Framework

    Kire Jakimoski, Zorica Stefanovska, Vekoslav Stefanovski
    31-41

    Article ID: 4048
    791  (Abstract) 515  (Download)

    Abstract: Cybersecurity is a global goal that is central to national security planning in many countries. One of the most active research fields is design of practices for the development of so-called highly secure software as a kind of protection and reduction of the risks from cyber threats. The use of a secure software product in... More

    2022-06-22
  • Data Analytics of an Information System Based on a Markov Decision Process and a Partially Observable Markov Decision Process

    Lidong Wang, Reed L. Mosher, Terril C. Falls, Patti Duett
    21-30

    Article ID: 5434
    232  (Abstract) 123  (Download)

    Abstract:

    Data analytics of an information system is conducted based on a Markov decision process (MDP) and a partially observable Markov decision process (POMDP) in this paper. Data analytics over a finite planning horizon and an infinite planning horizon for a discounted MDP is performed, respectively. Value iteration (VI), policy iteration (PI), and Q-learning are utilized in the data... More

    2023-02-28
  • Mobile Software Assurance Informed through Knowledge Graph Construction: The OWASP Threat of Insecure Data Storage

    Suzanna Schmeelk, Lixin Tao
    17-29

    Article ID: 1765
    1385  (Abstract) 236  (Download)

    Abstract: Many organizations, to save costs, are moving to the Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate. Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention. This research focuses on secure software... More

    2020-05-29
  • Detection of Buffer Overflow Attacks with Memoization-based Rule Set

    Oğuz Özger, Halit Öztekİn
    13-26

    Article ID: 6044
    429  (Abstract) 232  (Download)

    Abstract:

    Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized access in the systems. Buffer overflow anomaly is a prominent issue among these abnormalities, posing a serious threat to network security. The primary objective of this study is to identify the potential risks of buffer overflow... More

    2023-11-30
1 - 4 of 4 items

About Us

  • Profile
  • Payment Collection Information
  • Contact and support

Further Information

  • All Journals
  • Other Journals

Follow Us

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
Copyright © 2025 Bilingual Publishing Group
Disclaimer|Privacy Policy