• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 37 items 1 2 > >> 

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 335
PDF : 74
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 66
PDF : 22
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 100
PDF : 53
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 1933
PDF : 1099
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Secured Auto Encryption and Authentication Process for Cloud Computing Security

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03
Mst Zannatun Ferdus (1), Mst Zannatun Ferdus (2), Md. Hasan Monsur (3), Mst. Jahanara Akhtar (4), Saiful Islam (5)
1040-1044
Abstract : 275
PDF : 98
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03

Optimizing Edge AI for Real-Time Data Processing in IoT Devices: Challenges and Solutions

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2
Gopalakrishnan Arjunan (1)
944-953
Abstract : 296
PDF : 88
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec2

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 322
PDF : 94
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

Optimizing Hybrid Cloud Database Architecture: Integrating SQL Server and MongoDB in Azure Environments

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec05
Padma Rama Divya Achanta (1)
1815-1826
Abstract : 187
PDF : 47
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec05

Towards Computational Synergy: Present State-of-the-art of Mobile Cloud Computing

Kolluru Venkata Nagendra, , Dr. Maligela Ussenaiah (1)
Abstract : 37
PDF : 36
DOI:

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud by using Identity based Encryption

DOI:https://doi.org/10.18535/ijsrm/v5i7.08
Mutyala Ramya Krishna Vankamamidi S Naresh (1)
5833-5841
Abstract : 55
PDF : 24
DOI:https://doi.org/10.18535/ijsrm/v5i7.08

A Noval Approach of Enhancing Security in Cloud Using Diffie Hellman Algorithm

DOI:https://doi.org/10.18535/ijsrm/v5i7.38
Nancy Digra , Sandeep Sharma (1)
6113-6118
Abstract : 30
PDF : 19
DOI:https://doi.org/10.18535/ijsrm/v5i7.38

Hybrid Models for AI-Powered Automation In Cloud Data Reliability Engineering

Dillep kumar Pentyala (1)
715-730
Abstract : 31
PDF : 11
DOI:

A Quantitative Assessment of the Impact of Automated Incident Response on Cloud Services Availability

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec03
Saravanakumar Baskaran (1)
929-934
Abstract : 167
PDF : 33
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec03

Enhancement in OTP generation process for cloud data security using Diffie-Hellman and HMAC - A Review

Komalpreet Kaur, Rohit Sethi (1)
Abstract : 41
PDF : 26
DOI:

Cloudnymous Network and Data Security Model for Cloud

Roopa.V S.Sundararajan2 Dr.C.Emilin Shyni (1)
Abstract : 36
PDF : 29
DOI:

Building Cognitive Data Lakes on Cloud: Integrating NLP and AI to Make Data Lakes Smart

DOI:https://doi.org/10.18535/ijsrm/v12i03.ec19
Kiran Randhi (1), Srinivas Reddy Bandarapu (2)
1151-1161
Abstract : 128
PDF : 31
DOI:https://doi.org/10.18535/ijsrm/v12i03.ec19

Data privacy in cloud computing: A comparative study of privacy preserving techniques

DOI:https://doi.org/10.18535/
Gireesh Kambala (1)
1299-1316
Abstract : 317
PDF : 54
DOI:https://doi.org/10.18535/

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 415
PDF : 488
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security

DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07
Sumiya Jahan Simu (1), Fardin Ibn Zaman (2)
999-1016
Abstract : 296
PDF : 72
DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07

Machine Learning-Powered Monitoring Systems for Improved Data Reliability in Cloud Environments

Dillep Kumar Pentyala (1)
1854-1883
Abstract : 35
PDF : 25
DOI:

SECURE DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD USING BROADCASTING ENCRYPTION TECHNIQUES

S.Senthil Kumar Christo Paul.E Nilutpal Bose (1)
Abstract : 38
PDF : 48
DOI:

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 74
PDF : 72
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

Dynamic Audit Services for Outsourced Storages in Clouds

Devi Parvathy Mohan, K.J.Jagdish (1)
Abstract : 40
PDF : 32
DOI:

Reputation Systems in Cloud: A Review

DOI:https://doi.org/10.18535/ijsrm/v5i7.50
Neeraj, Major Singh Goraya, Damanpreet Singh (1)
6207-6212
Abstract : 57
PDF : 50
DOI:https://doi.org/10.18535/ijsrm/v5i7.50

Towards Secure Top-k Multi keyword Retrieval over encrypted cloud data

Lekshmi k pillai, P.Saranya, (1)
Abstract : 36
PDF : 19
DOI:
1 - 25 of 37 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved