• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 43 items 1 2 > >> 

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 498
PDF : 177
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 179
PDF : 97
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 234
PDF : 157
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 2532
PDF : 1616
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Secured Auto Encryption and Authentication Process for Cloud Computing Security

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03
Mst Zannatun Ferdus (1), Mst Zannatun Ferdus (2), Md. Hasan Monsur (3), Mst. Jahanara Akhtar (4), Saiful Islam (5)
1040-1044
Abstract : 349
PDF : 164
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03

Optimizing Edge AI for Real-Time Data Processing in IoT Devices: Challenges and Solutions

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2
Gopalakrishnan Arjunan (1)
944-953
Abstract : 629
PDF : 185
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 559
PDF : 211
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

Optimizing Hybrid Cloud Database Architecture: Integrating SQL Server and MongoDB in Azure Environments

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec05
Padma Rama Divya Achanta (1)
1815-1826
Abstract : 352
PDF : 120
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec05

Towards Computational Synergy: Present State-of-the-art of Mobile Cloud Computing

Kolluru Venkata Nagendra, , Dr. Maligela Ussenaiah (1)
Abstract : 109
PDF : 81
DOI:

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud by using Identity based Encryption

DOI:https://doi.org/10.18535/ijsrm/v5i7.08
Mutyala Ramya Krishna Vankamamidi S Naresh (1)
5833-5841
Abstract : 214
PDF : 79
DOI:https://doi.org/10.18535/ijsrm/v5i7.08

A Noval Approach of Enhancing Security in Cloud Using Diffie Hellman Algorithm

DOI:https://doi.org/10.18535/ijsrm/v5i7.38
Nancy Digra , Sandeep Sharma (1)
6113-6118
Abstract : 61
PDF : 36
DOI:https://doi.org/10.18535/ijsrm/v5i7.38

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 276
PDF : 94
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

Hybrid Models for AI-Powered Automation In Cloud Data Reliability Engineering

Dillep kumar Pentyala (1)
715-730
Abstract : 190
PDF : 73
DOI:

A Quantitative Assessment of the Impact of Automated Incident Response on Cloud Services Availability

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec03
Saravanakumar Baskaran (1)
929-934
Abstract : 307
PDF : 170
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec03

Enhancement in OTP generation process for cloud data security using Diffie-Hellman and HMAC - A Review

Komalpreet Kaur, Rohit Sethi (1)
Abstract : 117
PDF : 94
DOI:

Cloudnymous Network and Data Security Model for Cloud

Roopa.V S.Sundararajan2 Dr.C.Emilin Shyni (1)
Abstract : 129
PDF : 79
DOI:

Building Cognitive Data Lakes on Cloud: Integrating NLP and AI to Make Data Lakes Smart

DOI:https://doi.org/10.18535/ijsrm/v12i03.ec19
Kiran Randhi (1), Srinivas Reddy Bandarapu (2)
1151-1161
Abstract : 232
PDF : 95
DOI:https://doi.org/10.18535/ijsrm/v12i03.ec19

Data privacy in cloud computing: A comparative study of privacy preserving techniques

DOI:https://doi.org/10.18535/
Gireesh Kambala (1)
1299-1316
Abstract : 482
PDF : 356
DOI:https://doi.org/10.18535/

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 1035
PDF : 1270
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security

DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07
Sumiya Jahan Simu (1), Fardin Ibn Zaman (2)
999-1016
Abstract : 482
PDF : 154
DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07

SECURE DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD USING BROADCASTING ENCRYPTION TECHNIQUES

S.Senthil Kumar Christo Paul.E Nilutpal Bose (1)
Abstract : 101
PDF : 98
DOI:

Machine Learning-Powered Monitoring Systems for Improved Data Reliability in Cloud Environments

Dillep Kumar Pentyala (1)
1854-1883
Abstract : 118
PDF : 80
DOI:

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 191
PDF : 148
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

Dynamic Audit Services for Outsourced Storages in Clouds

Devi Parvathy Mohan, K.J.Jagdish (1)
Abstract : 136
PDF : 88
DOI:

Reputation Systems in Cloud: A Review

DOI:https://doi.org/10.18535/ijsrm/v5i7.50
Neeraj, Major Singh Goraya, Damanpreet Singh (1)
6207-6212
Abstract : 118
PDF : 92
DOI:https://doi.org/10.18535/ijsrm/v5i7.50
1 - 25 of 43 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved