• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 36 items 1 2 > >> 

An Empirical Study on Cybersecurity Awareness, Cybersecurity Concern, and Vulnerability to Cyber-attacks

DOI:https://doi.org/10.18535/ijsrm/v12i04.ec05
Chahak Mittal (1)
1144-1158
Abstract : 489
PDF : 354
DOI:https://doi.org/10.18535/ijsrm/v12i04.ec05

Emerging Threats: The Latest Cybersecurity Risks and the Role of Artificial Intelligence in Enhancing Cybersecurity Defenses

DOI:https://doi.org/10.18535/ijsrm/v9i2.ec01
Fnu Jimmy (1)
564-574
Abstract : 1275
PDF : 540
DOI:https://doi.org/10.18535/ijsrm/v9i2.ec01

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 520
PDF : 182
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

The Role of Artificial Intelligence in Predicting Cyber Threats

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04
FNU Jimmy (1)
935-953
Abstract : 435
PDF : 286
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04

Bridging Borders with AI: Enhancing Global Cybersecurity Through Intelligent Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec11
Goutham Sunkara (1)
2352-2363
Abstract : 165
PDF : 86
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec11

Improving resilience and efficiency in the energy sector: A perspective on cybersecurity and renewable energy storage.

DOI:https://doi.org/10.18535/ijsrm/v12i05.m01
Oluwadamilola Ogunleye (1), Sulaimon Adeniji (2), Valentine Onih (3), Yufenyuy Simo (4), Emmanuel Elom (5), Emmanuel Kanu (6), Abdul-Waliyyu Bello (7), Callistus Obunadike (8), Nnaji Chukwu (9), Oluomachi Ejiofor (10), Juliet Ogutu (11), Chinenye Obunadike (12), Tosin Clement (13), Somto Kizor-Akaraiwe (14)
502-513
Abstract : 574
PDF : 212
DOI:https://doi.org/10.18535/ijsrm/v12i05.m01

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 1072
PDF : 1397
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security

DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07
Sumiya Jahan Simu (1), Fardin Ibn Zaman (2)
999-1016
Abstract : 485
PDF : 157
DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 260
PDF : 137
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

An Integrated PMT-TAM Approach to Cybersecurity Awareness: Evidence from Sierra Leone's Universities and Policy Lessons for Developing Nations

DOI:https://doi.org/10.18535/ijsrm/v13i08.ec06
Mohamed Koroma (1), Mohamed Syed Fofanah (2), Maurice Sesay (3), Ibrahim Abdulai Sawaneh (4)
2587-2614
Abstract : 183
PDF : 145
DOI:https://doi.org/10.18535/ijsrm/v13i08.ec06

Social Engineering Attacks in US Healthcare: A Critical Analysis of Vulnerabilities and Mitigation Strategies

DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03
Obi Marizu (1)
928-939
Abstract : 390
PDF : 312
DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03

The Future of Electric Vehicles: Navigating the Intersection of AI, Cloud Technology, and Cybersecurity

DOI:https://doi.org/10.18535/ijsrm/v12i04.ec04
Hassan Rehan (1)
1127-1143
Abstract : 433
PDF : 291
DOI:https://doi.org/10.18535/ijsrm/v12i04.ec04

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1523
PDF : 271
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Revolutionizing Cybersecurity: Behavioral Analysis and Automated Incident Response through Predictive Analytics

DOI:https://doi.org/10.18535/ijsrm/v10i10.ec04
Phani Durga Nanda Kishore Kommisetty (1), Bala Maruthi Subba Rao Kuppala (2), Hussain Vali Buvvaji (3), Venkata Rama Reddy Sabbella (4)
962-979
Abstract : 199
PDF : 119
DOI:https://doi.org/10.18535/ijsrm/v10i10.ec04

A Comprehensive Framework for Threat Intelligence-Driven Incident Detection

DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01
Saravanakumar Baskaran (1)
288-293
Abstract : 164
PDF : 83
DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01

The Evolution of Security Operations Centers (SOCs): Shifting from Reactive to Proactive Cybersecurity Strategies

DOI:https://doi.org/10.18535/ijsrm/v6i9.ec03
Gourav Nagar (1)
100-115
Abstract : 307
PDF : 127
DOI:https://doi.org/10.18535/ijsrm/v6i9.ec03

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 567
PDF : 220
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 197
PDF : 152
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

History and Legacy of Alan Turing for Computer Science

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec06
Danilo Morais da Silva (1), Robson da Costa Farias (2), António Cunha (3), Lindamir Salete Casagrande (4), Rita Antunes Peres (5)
1047-1056
Abstract : 2353
PDF : 223
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec06

Beyond the Screen: Real-World Impacts of Computer Science Innovations

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec07
Ayeong Shon (1)
1565-1570
Abstract : 265
PDF : 75
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec07

Cybersecurity risk management in the industry 4.0

DOI:https://doi.org/10.18535/ijsrm/v10i3.ec01
Pedro Brandao (1), Paulo Duarte Branco (2)
747-754
Abstract : 372
PDF : 156
DOI:https://doi.org/10.18535/ijsrm/v10i3.ec01

Digital Twins in IT: Enhancing System Monitoring and Predictive Maintenance

Gireesh Kambala (1)
1658-1674
Abstract : 159
PDF : 132
DOI:

AI Office Assistant: Accelerating the Vision of Smart Bangladesh

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2)
1234-1244
Abstract : 186
PDF : 132
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08

The Evolution of Ransomware: Tactics, Techniques, and Mitigation Strategies

DOI:https://doi.org/10.18535/ijsrm/v12i06.ec09
Gourav Nagar (1)
1282-1298
Abstract : 1193
PDF : 505
DOI:https://doi.org/10.18535/ijsrm/v12i06.ec09

Pragmatic critical realism and Mixed methods in Inter-disciplinary Research—Management and Information systems

DOI:https://doi.org/10.18535/ijsrm/v12i03.em01
Huma Imran (1)
5953-5962
Abstract : 2162
PDF : 923
DOI:https://doi.org/10.18535/ijsrm/v12i03.em01
1 - 25 of 36 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved