• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 26 items 1 2 > >> 

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 259
PDF : 84
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 180
PDF : 134
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1422
PDF : 253
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 488
PDF : 170
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Machine Learning Methods for Intrusion Detection: A Comprehensive Survey

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07
Mobolaji Ogunbadejo (1), Oluwatobi Adedamola Ayilara-Adewale (2), Olanrewaju Alade (3)
2446-2456
Abstract : 174
PDF : 65
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07

AI-Augmented Vulnerability Discovery through Static Code Pattern Clustering in Micro services

DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01
Gopinath Kathiresan (1)
2145-2154
Abstract : 500
PDF : 141
DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01

National Predictive Analytics Framework for Preventing Healthcare Fraud and Abuse

DOI:https://doi.org/10.18535/ijsrm/v13i11.m01
Abdul-Waliyyu Bello (1), Aishat Ojikutu (2)
657-671
Abstract : 193
PDF : 34
DOI:https://doi.org/10.18535/ijsrm/v13i11.m01

The Role of Artificial Intelligence in Predicting Cyber Threats

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04
FNU Jimmy (1)
935-953
Abstract : 425
PDF : 275
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 170
PDF : 90
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

DETECTING OUTLIERS USING osPCA

J.Gnana Sekaran , P.Saranya (1)
Abstract : 114
PDF : 64
DOI:

Machine Learning for Enhancing Mortgage Origination Processes: Streamlining and Improving Efficiency

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02
Hariharan Pappil Kothandapani (1)
Abstract : 247
PDF : 106
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02

AI-Enabled Statistical Process Control for Semiconductor Manufacturing Quality Improvement

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec07
Gaurav Rajendra Parashare (1)
2279-2300
Abstract : 1169
PDF : 367
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec07

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 156
PDF : 60
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 450
PDF : 277
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

Dynamic Audit Services for Outsourced Storages in Clouds

Devi Parvathy Mohan, K.J.Jagdish (1)
Abstract : 122
PDF : 83
DOI:

Digital Twins in IT: Enhancing System Monitoring and Predictive Maintenance

Gireesh Kambala (1)
1658-1674
Abstract : 155
PDF : 113
DOI:

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 248
PDF : 125
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Use of Artificial Intelligence in Medical Devices for Post-Market Surveillance

DOI:https://doi.org/10.18535/ijsrm/v12i08.ec05
Samadrita Ghosh (1)
1374-1387
Abstract : 491
PDF : 335
DOI:https://doi.org/10.18535/ijsrm/v12i08.ec05

Improving Distributed Cloud Data Engineering with AI-Powered Failure Prediction Systems

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec10
Dillep Kumar Pentyala (1)
1764-1787
Abstract : 148
PDF : 83
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec10

Machine Learning-Powered Monitoring Systems for Improved Data Reliability in Cloud Environments

Dillep Kumar Pentyala (1)
1854-1883
Abstract : 112
PDF : 77
DOI:

Cloudnymous Network and Data Security Model for Cloud

Roopa.V S.Sundararajan2 Dr.C.Emilin Shyni (1)
Abstract : 125
PDF : 75
DOI:

Deep Learning Techniques for Adaptive Resource Allocation and Data Reliability in Cloud Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec12
Dillep Kumar Pentyala (1)
1095-1018
Abstract : 115
PDF : 90
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec12

AIOps in cloud computing: Automation performance Monitoring with AI and New Relic

DOI:https://doi.org/10.18535/ijsrm/v10i3.ec08
Ravi chandra Thota (1)
809-817
Abstract : 200
PDF : 73
DOI:https://doi.org/10.18535/ijsrm/v10i3.ec08

Generative AI for Predictive Maintenance: Predicting Equipment Failures and Optimizing Maintenance Schedules Using AI

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec03
Alma Mohapatra (1)
1648-1672
Abstract : 1426
PDF : 369
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec03

Data-Driven Process Optimization Using AI and Statistical Methods in High-Tech Manufacturing

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec09
Gaurav Rajendra Parashare (1)
1854-1874
Abstract : 234
PDF : 116
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec09
1 - 25 of 26 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved