• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 33 items 1 2 > >> 

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 1974
PDF : 1119
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 331
PDF : 96
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

Machine Learning Empowered Computer Networks

Santhosh K (1), Gary D (2), Chris C (3), Samyek N (4)
4861-4871
Abstract : 52
PDF : 38
DOI:

Network Security Issues and Tools for Testing Security in Computer Network.

Rachit Gupta, ShwetanakSaurabh, Neeraj Kumar (1)
Abstract : 34
PDF : 33
DOI:

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 66
PDF : 24
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Network Security: Attacks, Tools and Techniques

Vandna Ritu Sindhu (1)
Abstract : 37
PDF : 21
DOI:

Pre-Service Teachers’ Perception of Online Teaching and Learning During the COVID – 19 Era

DOI:https://doi.org/10.18535/ijsrm/v8i10.el01
Anna Mwinbuabu Naah (1)
1649-1662
Abstract : 292
PDF : 98 XML : 43
DOI:https://doi.org/10.18535/ijsrm/v8i10.el01

Computer Science and Software Engineering

Meenakshi Dhamija1 , Dr. Ritu Sindhu2 (1)
Abstract : 33
PDF : 19
DOI:

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 427
PDF : 496
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 919
PDF : 131
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 102
PDF : 55
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

Improved Privacy over Authentication of K-Nearest Neighbor Query on Spatial Network

V.Srilakshm, P.Dhamodharan (1)
Abstract : 32
PDF : 19
DOI:

Optimizing Edge AI for Real-Time Data Processing in IoT Devices: Challenges and Solutions

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2
Gopalakrishnan Arjunan (1)
944-953
Abstract : 306
PDF : 88
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2

Cloudnymous Network and Data Security Model for Cloud

Roopa.V S.Sundararajan2 Dr.C.Emilin Shyni (1)
Abstract : 36
PDF : 29
DOI:

Remote execution of physical tasks by putting into contributionDOSN: Case of Money Transfer

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec01
Lienou Jean-Pierre (1), Thierry Noulamo (2), Alain Djimeli-Tsajio (3)
904-913
Abstract : 118
PDF : 60
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec01

Fuzzy Logic Based Handover decision and Necessity Estimation Scheme for Heterogeneous Wireless Networks

Er Sunita 1 , Er Sonika Soni2 , Er Silki Baghla2 (1)
Abstract : 25
PDF : 19
DOI:

Social Engineering Attacks in US Healthcare: A Critical Analysis of Vulnerabilities and Mitigation Strategies

DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03
Obi Marizu (1)
928-939
Abstract : 200
PDF : 112
DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03

Security attacks on Routing protocols and Intrusion Detection in MANET

DOI:https://doi.org/10.18535/ijsrm/v5i9.17
R.M. Chamudeeswari (1), Dr.P. Sumathi (2)
7067-7073
Abstract : 54
PDF : 22
DOI:https://doi.org/10.18535/ijsrm/v5i9.17

Mobile Banking and Security Challenges

DOI:https://doi.org/10.18535/ijsrm/v5i7.26
Dr.G. Sasikumar (1)
6014-6018
Abstract : 78
PDF : 211
DOI:https://doi.org/10.18535/ijsrm/v5i7.26

Security and Concurrency Control in Distributed Database System

Manoj Kumar Sah Vinod Kumar Ashish Tiwari (1)
Abstract : 39
PDF : 235
DOI:

Web ontology language - Business Process Customization Based Dynamic Customization for Composite Web Service

Malathi.T, Kalpana.K (1)
Abstract : 33
PDF : 25
DOI:

Performance and Institutional Delivery Capacity of Key Road Sector Agencies in Uganda

DOI:https://doi.org/10.18535/ijsrm/v7i1.ec02
Anthony Geoffrey Kerali (1), Yasin Olum (2)
162-180
Abstract : 69
PDF : 64
DOI:https://doi.org/10.18535/ijsrm/v7i1.ec02

Design of Unique Auto Disconnect Password Generation for Public Wi-Fi Routers

DOI:https://doi.org/10.18535/ijsrm/v5i6.21
Mr.T.M.Hayath, Ms.Akhila Kurni, Ms.Aishwarya Hiremath C, Ms.Sinduja J, (1)
Abstract : 51
PDF : 19
DOI:https://doi.org/10.18535/ijsrm/v5i6.21

AI-Driven Edge Computing in the Cloud Era: Challenges and Opportunities

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec5
Vinay Chowdary Manduva (1)
1007-1013
Abstract : 61
PDF : 15
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec5

Assessing the Influence of 5G Technology on Distributed System Architectures for Real-Time Applications

DOI:https://doi.org/10.18535/ijsrm/v12i1.ec01
Nagaraj Parvatha (1)
972-979
Abstract : 33
PDF : 13
DOI:https://doi.org/10.18535/ijsrm/v12i1.ec01
1 - 25 of 33 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved