Computer and Information Science
2020 - 2025
From Canadian Center of Science and Education Contact information at EDIRC. Bibliographic data for series maintained by Canadian Center of Science and Education (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 18, issue 2, 2025
- Neuro-Symbolic Reasoning for Cyber Compliance Violation Detection pp. 1

- Kutub Thakur
- An Innovative Mobile Application for Analyzing Learning Objectives Using Bloom's Taxonomy pp. 18

- Samir Hamada and Salwa Hamada
- Smart Waste Management Systems: An IoT and AI-Driven Approach for Urban Sanitation pp. 30

- Seun Adeoye
- Synergistic Optimization of Humanoid Robot Arm Configuration and Flexible Vision Measurement and Calibration System pp. 50

- Yinjin Xiao, Shuzhen Huang, Yi Chen, Liangcheng Xiao and Peiyi Huang
- Malware – Common Attacks & Preventions pp. 58

- Beatrice Atobatele
- Reviewer Acknowledgements for Computer and Information Science, Vol. 18, No. 2 pp. 69

- Chris Lee
Volume 18, issue 1, 2025
- Betweenness-based Ranking of Edges using the Principal Components of the Complements of Local Clustering Coefficient and Neighborhood Overlap pp. 1

- Natarajan Meghanathan
- Contribution to the Modeling of Electromagnetic Lightning Transients in High Voltage Power Transmission Lines Connecting Regions With High Storm Density pp. 17

- Anthony Bassesuka Sandoka Nzao and Tuka Biaba Samuel Garcia
- DevSecOps Sentinel: GenAI-Driven Agentic Workflows for Comprehensive Supply Chain Security pp. 39

- Gyani Pillala, Damoon Azarpazhooh and Scott Baxter
- Efficient Internet Connectivity to Rural Area: An Approach to Implement Effective Cashless Policy to Improve Micro Economic Activities in Nigeria pp. 53

- Enyia Emmanuel Chijioke, Izunobi Anthony Okechukwu, Enyia Ugochukwu Oliver, Sampson Ikenna Ogoke, Agbakwuru Onyekachi Alphonsus and Amanze Bethran Chibuike
- Core-Periphery Analysis Using Principal Components of the Neighborhood-based Bridge Node Centrality Tuple pp. 62

- Natarajan Meghanathan
- The Fabric of Fellowship: Examining Group Dynamics in Final Fantasy Video Games pp. 78

- Annabel Sharrin, Joel Betancourt, Jeffrey Zhang, Damian Schofield and John Lindstedt
- Utilizing Machine Learning Models to Forecast Pricing on Mechanical Components and Automate Sourcing pp. 102

- Manas Kumar Singh, Shreya Kumari and Pranjal Singh
- Dynamically Weighted Pairwise Cross-Attention Driven Feature Fusion in Hybrid Convolutional Neural Networks for Classification of COVID-19 Variants pp. 111

- Vatsal Shah, Love Fadia, Mohammad Hassanzadeh, Jonathan Wu, Majid Ahmadi and George Pappas
- Reviewer Acknowledgements for Computer and Information Science, Vol. 18, No. 1 pp. 168

- Chris Lee
Volume 17, issue 2, 2024
- Opportunities for Using Machine Learning and Artificial Intelligence in Business Analytics pp. 1

- Conrad Onesime Oboulhas Tsahat, Ngoulou-A -Ndzeli and Charmolavy Goslavy Lionel Nkouka Moukengue
- Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System pp. 7

- Anthony Bassesuka Sandoka Nzao
- Proactively Defending Enterprise Computer Systems Against Threats and Vulnerabilities pp. 28

- Faris Sharaf, Abdullah Alhayajneh and Thaier Hayajneh
- Generative AI Increases Cybersecurity Risks for Seniors pp. 39

- Zahm Siyed
- Application and Innovation of Artificial Intelligence in Forensic Medicine pp. 52

- Minni Qi, Dan Zhou and Xiaojun Yu
- Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 2 pp. 60

- Chris Lee
Volume 17, issue 1, 2024
- Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees pp. 1

- Andrew McInnis, Mohammad Alshibli, Ahmad Alzaghal and Samir Hamada
- On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments pp. 9

- Abdullah Albalawi
- A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System pp. 18

- Duncan Kereu Kodhek, John Wachira Kamau and Faith Mueni Musyoka
- Principal Components and Assortativity-based Assessment of the Similarity of Crime Metrics across Coterminous Wards in the City of Chicago pp. 36

- Natarajan Meghanathan
- Ethical Implication of Artificial Intelligence (AI) Adoption in Financial Decision Making pp. 49

- Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Christopher Ihejirika, Riyad Bin Islam and Bishal Jung Thapa Chhetri
- Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 1 pp. 57

- Chris Lee
Volume 16, issue 4, 2023
- The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era pp. 1

- Abdullah Al Hayajneh, Hasnain Nizam Thakur and Kutub Thakur
- Electronic Health System Integration Framework for Secure M-Health Services: A Case of University of Nairobi Hospital pp. 21

- Samuel Nandasaba, Gregory Wanyembi and Geoffrey Mariga Wambugu
- Malware Investigation and Analysis for Cyber Threat Intelligence: A Case Study of Flubot Malware pp. 47

- Uchenna J. Nzenwata, Frank Uchendu, Haruna Ismail, Eluwa M. Jumoke and Himikaiye O. Johnson
- Proposal of a Visualization System for a Hierarchical Clustering Algorithm: The Visualize Proximity Matrix pp. 65

- Sulaiman Abdullah Alateyah
- Applying AI in the Healthcare Sector: Difficulties pp. 78

- Abdussalam Garba, Muhammad Baballe Ahmad and Mukhtar Ibrahim Bello
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 4 pp. 84

- Chris Lee
Volume 16, issue 3, 2023
- Identifying and Navigating the Current Trends in Business Librarianship and Data Librarianship pp. 1

- Renee Pistone
- The Effect of the Educational Robot on the Motor Reaction on Some Karate Skills pp. 7

- Mohammed Asim Ghazi
- On the Convergence of Hypergeometric to Binomial Distributions pp. 15

- Upul Rupassara and Bishnu Sedai
- Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms pp. 22

- Basra Farooq Dar, Malik Sajjad Ahmed Nadeem, Samina Khalid, Farzana Riaz, Yasir Mahmood and Ghias Hameed
- Drawbacks of Traditional Environmental Monitoring Systems pp. 30

- Sadiku Aminu Sani, Amina Ibrahim, Abuhuraira Ado Musa, Muntaka Dahiru and Muhammad Ahmad Baballe
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3 pp. 36

- Chris Lee
Volume 16, issue 2, 2023
- Studying the Effects of Being Einstein: An Experiment in Social Virtual Reality pp. 1

- Ian Cummins and Damian Schofield
- The Role of Machine Learning in the Detection and Classification of Brain Tumors: A Literature Review of the Past Two Years pp. 20

- Jianyi Wang
- From Zero to Infinity: Research on the Development Process of Intelligent Manufacturing pp. 29

- Chen Peng
- Suhail: A Deep Learning-Based System for Identifying Missing People pp. 36

- Wareef K. Aljohani, Reem A. Alshehri, Abrar A. Alghamdi, Mashael M. Aljuhani, Dareen A. Alrefaei, Rahaf S. Aljohani and Abdulqader M. Almars
- Automation-Based User Input Sql Injection Detection and Prevention Framework pp. 51

- Fredrick Ochieng Okello, Dennis Kaburu and Ndia G. John
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2 pp. 63

- Chris Lee
Volume 16, issue 1, 2023
- A Reference Framework for Variability Management of Software Product Lines pp. 1

- Saiqa Aleem, Luiz Fernando Capretz and Faheem Ahmed
- Analysis of the Influence of the Earthing Resistance of Pylones on the Performance of the HVAC Line Facing Electromagnetic Transitories Lightning pp. 25

- Anthony Bassesuka Sandoka Nzao
- CNN Model for Sleep Apnea Detection Based on SpO2 Signal pp. 39

- Maryah Abdullah Albuhayri
- The Role of Digital Technologies in Combating Cyber-Trafficking in Persons Crimes pp. 49

- Sami Saad Alsemairi
- Simulation and Analysis of Fully Adiabatic Circuit Designing with Single Power Clock for High-Frequency Low-Power VLSI Circuits pp. 65

- Yashu Swami
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 1 pp. 73

- Chris Lee
| |