• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 15 of 15 items

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 530
PDF : 191
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

The Role of Artificial Intelligence in Predicting Cyber Threats

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04
FNU Jimmy (1)
935-953
Abstract : 454
PDF : 293
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 211
PDF : 172
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 262
PDF : 137
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1559
PDF : 273
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

A Comprehensive Framework for Threat Intelligence-Driven Incident Detection

DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01
Saravanakumar Baskaran (1)
288-293
Abstract : 172
PDF : 89
DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01

Digital Twins in IT: Enhancing System Monitoring and Predictive Maintenance

Gireesh Kambala (1)
1658-1674
Abstract : 162
PDF : 139
DOI:

Revolutionizing Cybersecurity: Behavioral Analysis and Automated Incident Response through Predictive Analytics

DOI:https://doi.org/10.18535/ijsrm/v10i10.ec04
Phani Durga Nanda Kishore Kommisetty (1), Bala Maruthi Subba Rao Kuppala (2), Hussain Vali Buvvaji (3), Venkata Rama Reddy Sabbella (4)
962-979
Abstract : 200
PDF : 124
DOI:https://doi.org/10.18535/ijsrm/v10i10.ec04

The Evolution of Security Operations Centers (SOCs): Shifting from Reactive to Proactive Cybersecurity Strategies

DOI:https://doi.org/10.18535/ijsrm/v6i9.ec03
Gourav Nagar (1)
100-115
Abstract : 311
PDF : 127
DOI:https://doi.org/10.18535/ijsrm/v6i9.ec03

Scalable Data Engineering Approaches For Ai-Driven Industrial Iot Applications

DOI:https://doi.org/10.18535/ijsrm/v11i06.ec3
Narendra Devarasetty (1)
954-968
Abstract : 194
PDF : 108
DOI:https://doi.org/10.18535/ijsrm/v11i06.ec3

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 309
PDF : 119
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 492
PDF : 327
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

Machine Learning Methods for Intrusion Detection: A Comprehensive Survey

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07
Mobolaji Ogunbadejo (1), Oluwatobi Adedamola Ayilara-Adewale (2), Olanrewaju Alade (3)
2446-2456
Abstract : 212
PDF : 92
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07

AI Office Assistant: Accelerating the Vision of Smart Bangladesh

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2)
1234-1244
Abstract : 187
PDF : 134
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec08

Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight

DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05
Gourav Nagar (1)
78-94
Abstract : 320
PDF : 128
DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05
1 - 15 of 15 items

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved