• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 16 of 16 items

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 138
PDF : 109
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

DATA PRIVACY AND REGULATORY COMPLIANCE IN THE USA: A CALL FOR A CENTRALIZED REGULATORY FRAMEWORK

DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01
Olumide Ajayi (1)
573-584
Abstract : 654
PDF : 119
DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01

Integrity and Confidentiality of Data Protection on Consumers' Privacy in Tanzania: A Case Study of TCRA

DOI:https://doi.org/10.18535/ijsrm/v11i03.em11
Mishael Abduel (1), Kulwa Magingila (2)
4770-4775
Abstract : 150
PDF : 145
DOI:https://doi.org/10.18535/ijsrm/v11i03.em11

IDMap: Leveraging AI and Data Technologies for Early Cancer Detection

DOI:https://doi.org/10.18535/ijsrm/v12i08.mp03
Sabira Arefin (1)
1138-1148
Abstract : 170
PDF : 81
DOI:https://doi.org/10.18535/ijsrm/v12i08.mp03

Data privacy in cloud computing: A comparative study of privacy preserving techniques

DOI:https://doi.org/10.18535/
Gireesh Kambala (1)
1299-1316
Abstract : 332
PDF : 59
DOI:https://doi.org/10.18535/

Innovative Data Collection Methods for Advancing Coastal Management in Liberia

DOI:https://doi.org/10.18535/ijsrm/v12i10.fe01
Elijah Kollie (1)
348-368
Abstract : 429
PDF : 103
DOI:https://doi.org/10.18535/ijsrm/v12i10.fe01

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 151
PDF : 43
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 102
PDF : 55
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 77
PDF : 31
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

Protection on Social Network Data Using Sensitive and NonSensitive Labels

Prabhanjana Konni Balaka Ramesh Naidu (1)
Abstract : 26
PDF : 17
DOI:

Contribution of Counseling Assistance Services in the Support of the Students’ Acquisition of Life Skills among Public Secondary Schools in Moshi Municipality

DOI:https://doi.org/10.18535/ijsrm/v12i09.el07
Samira Sadiki Kinyumbi (1), Dr. Peter Siamoo (2), Dr. Gadi M. Koda (3)
3637-3646
Abstract : 249
PDF : 37
DOI:https://doi.org/10.18535/ijsrm/v12i09.el07

Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating In Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em02
CPA Dr. Leonard W. Wakoli (1)
8037-8046
Abstract : 925
PDF : 86
DOI:https://doi.org/10.18535/ijsrm/v12i12.em02

AI Office Assistant: Accelerating the Vision of Smart Bangladesh

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2)
1234-1244
Abstract : 93
PDF : 58
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud by using Identity based Encryption

DOI:https://doi.org/10.18535/ijsrm/v5i7.08
Mutyala Ramya Krishna Vankamamidi S Naresh (1)
5833-5841
Abstract : 55
PDF : 25
DOI:https://doi.org/10.18535/ijsrm/v5i7.08

Computer Security and Intrusion detection System-A Data Mining Based Approach

DOI:https://doi.org/10.18535/ijsrm/v5i6.33
Neetu Anand, Tapas Kumar (1)
Abstract : 50
PDF : 19
DOI:https://doi.org/10.18535/ijsrm/v5i6.33

An Efficient Encrypted Digital Image Watermarking Scheme

Kavitha Kapala, 2 Jagadeeswararao G (1)
Abstract : 36
PDF : 19
DOI:
1 - 16 of 16 items

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved