Você está na página 1de 3

Author(s) Name

Manuscript Preparation Guidelines for International Journal of


Computer Science and Security

Author Name1 email@address.com


Faculty/Department/Division
University
City, Post code, Country

Author Name2 email@address.com


Faculty/Department/Division
University
City, Post code, Country
Abstract

These instructions are for authors of submitting the research papers to the
International Journal of Computer Science and Security (IJCSS). IJCSS is
seeking research papers, technical reports, dissertation, letter etc for these
interdisciplinary areas. The goal of the IJCSS is to publish the most recent results
in the development of information technology.

Keywords: Keyword1, Keyword2, Keyword3, Keyword4, Keyword5.

1. INTRODUCTION
These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,
dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the
most recent results in the development of information technology.

These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,
dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the
most recent results in the development of information technology. These instructions are for
authors of submitting the research papers to the International Journal of Computer Science and
Security (IJCSS). IJCSS is seeking research papers, technical reports, dissertation, letter etc for
these interdisciplinary areas. The goal of the IJCSS is to publish the most recent results in the
development of information technology. These instructions are for authors of submitting the
research papers to the International Journal of Computer Science and Security (IJCSS). IJCSS is
seeking research papers, technical reports, dissertation, letter etc for these interdisciplinary
areas. The goal of the IJCSS is to publish the most recent results in the development of
information technology.

2. PRELIMINARIES
These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,
dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the

International Journal of Computer Science and Security, (IJCSS), Volume (1): Issue (3) 1
Author(s) Name

most recent results in the development of information technology. These instructions are for
authors of submitting the research papers to the International Journal of Computer Science and
Security (IJCSS). IJCSS is seeking research papers, technical reports, dissertation, letter etc for
these interdisciplinary areas. The goal of the IJCSS is to publish the most recent results in the
development of information technology. These instructions are for authors of submitting the
research papers to the International Journal of Computer Science and Security (IJCSS). IJCSS is
seeking research papers, technical reports, dissertation, letter etc for these interdisciplinary
areas. The goal of the IJCSS is to publish the most recent results in the development of
information technology

2.1 Preliminaries1
These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,
dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the
most recent results in the development of information technology. These instructions are for
authors of submitting the research papers to the International Journal of Computer Science and
Security (IJCSS). IJCSS is seeking research papers, technical reports, dissertation, letter etc for
these interdisciplinary areas. The goal of the IJCSS is to publish the most recent results in the
development of information technology. These instructions are for authors of submitting the
research papers to the International Journal of Computer Science and Security (IJCSS). IJCSS is
seeking research papers, technical reports, dissertation, letter etc for these interdisciplinary
areas. The goal of the IJCSS is to publish the most recent results in the development of
information technology

2.2 Preliminaries1
These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,
dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the
most recent results in the development of information technology. These instructions are for
authors of submitting the research papers to the International Journal of Computer Science and
Security (IJCSS). IJCSS is seeking research papers, technical reports, dissertation, letter etc for
these interdisciplinary areas.

FIGURE 1: Figures Can Be of Any Size But Must Be Centered.

These instructions are for authors of submitting the research papers to the International Journal
of Computer Science and Security (IJCSS). IJCSS is seeking research papers, technical reports,

International Journal of Computer Science and Security, (IJCSS), Volume (1): Issue (3) 2
Author(s) Name

dissertation, letter etc for these interdisciplinary areas. The goal of the IJCSS is to publish the
most recent results in the development of information technology. These instructions are for
authors of submitting the research papers to the International Journal of Computer Science and
Security (IJCSS). IJCSS is seeking research papers, technical reports, dissertation, letter etc for
these interdisciplinary areas. These instructions are for authors of submitting the research papers
to the International Journal of Computer Science and Security (IJCSS). IJCSS is seeking
research papers, technical reports, dissertation, letter etc for these interdisciplinary areas. The
goal of the IJCSS is to publish the most recent results in the development of information
technology. These instructions are for authors of submitting the research papers to the
International Journal of Computer Science and Security (IJCSS). IJCSS is seeking research
papers, technical reports, dissertation, letter etc for these interdisciplinary areas.

Column1 Column2 Column3


Value 1 Value 2 Value 3
Value 4 Value 5 Value 6
Value 7 Value 8 Value 9

TABLE 1: Tables Can Be of Any Size But Must Be Centered.

3. CONSLUSION & FUTURE WORK

4. REFERENCES
References should be indicated in the text by consecutive numbers in square brackets, as [1], [2]
etc.

1. FOR JOURNALS: I. Ray, M. Kumar. “Towards a location-based mandatory access


control model”. Computers & Security, 25(1):36-44, 2006

2. FOR CONFERENCES: M. Covington, M. Moyer and M. Ahmad. “Generalized role-based


access control for securing future applications”. In Proceedings of the 23rd National
Information Systems Security Conference. Baltimore, MD, USA, 2000

3. FOR BOOKS: F. R. Shanley. “Basic Structures”, John Willey & Sons Inc., pp. 291-314
(1947)

4. FOR THESIS: E. Constantine. “A role-based framework for distributed systems


management”. PhD Thesis, University of London, July 1998

International Journal of Computer Science and Security, (IJCSS), Volume (1): Issue (3) 3

Você também pode gostar