• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 216 items 1 2 3 4 5 6 7 8 9 > >> 

Influence of Organizational Security Learning Practices on Insider Security Threats in SoCs in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i08.em04
Charles Mwenda Ikiara (1), Dr. Boniface Ratemo (2), Dr. George Musumba (3)
7027-7035
Abstract : 262
PDF : 85
DOI:https://doi.org/10.18535/ijsrm/v12i08.em04

Factors Influencing Information Security Culture in Organizations Dealing With Economic Crime in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em12
John Onyango Abingo (1), Dr. George Musumba (2), Dr.Anthony Maina Mbuki (3)
8141-8149
Abstract : 256
PDF : 90
DOI:https://doi.org/10.18535/ijsrm/v12i12.em12

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 2166
PDF : 1383
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 113
PDF : 48
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 409
PDF : 112
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 409
PDF : 144
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

A Review of The Literature on An Examination of The Effects of Cyber Security in Improved Public Sector Institution Performance in Jordan

DOI:https://doi.org/10.18535/ijsrm/v12i06.ec03
Alanoud Amer Saleem Alrkeebat (1)
1266-1273
Abstract : 105
PDF : 58
DOI:https://doi.org/10.18535/ijsrm/v12i06.ec03

Reflecting on the Impacts of the 2013 coup in Central Africa Republic on Economic Security

DOI:https://doi.org/10.18535/ijsrm/v10i2.sh02
Jonah Marawako (1)
940-958
Abstract : 98
PDF : 120
DOI:https://doi.org/10.18535/ijsrm/v10i2.sh02

Enhancing Software Security: A Research-Driven Automation Framework

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03
Pushpalika Chatterjee (1), Apurba Das (2)
1793-1803
Abstract : 310
PDF : 57
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 99
PDF : 54
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Factors That Influence the Uptake of an M-Pesa Security System among Mpesa Agents In Nairobi County

DOI:https://doi.org/10.18535/ijsrm/v13i05.as01
Irene Sitawa Sichangi (1)
111-117
Abstract : 188
PDF : 43 PDF : 77
DOI:https://doi.org/10.18535/ijsrm/v13i05.as01

Understanding Turnover Intention: Exploring the Influence of Job Security, Perceived Organizational Support, and Job Satisfaction as a Mediator

DOI:https://doi.org/10.18535/ijsrm/v11i12.em11
Diana Nafishah Putri (1), Fatmah Bagis (2), Naelati Tubastuvi (3), Hengky Widhiandono (4)
5614-5630
Abstract : 684
PDF : 306
DOI:https://doi.org/10.18535/ijsrm/v11i12.em11

Influence Of Web Security Decisions By Hci Models

K. Akhil . (1)
Abstract : 50
PDF : 38
DOI:

Network Security Issues and Tools for Testing Security in Computer Network.

Rachit Gupta, ShwetanakSaurabh, Neeraj Kumar (1)
Abstract : 51
PDF : 48
DOI:

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 150
PDF : 28
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating In Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em02
CPA Dr. Leonard W. Wakoli (1)
8037-8046
Abstract : 975
PDF : 117
DOI:https://doi.org/10.18535/ijsrm/v12i12.em02

Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight

DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05
Gourav Nagar (1)
78-94
Abstract : 210
PDF : 73
DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 589
PDF : 606
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1058
PDF : 166
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Secured Auto Encryption and Authentication Process for Cloud Computing Security

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03
Mst Zannatun Ferdus (1), Mst Zannatun Ferdus (2), Md. Hasan Monsur (3), Mst. Jahanara Akhtar (4), Saiful Islam (5)
1040-1044
Abstract : 298
PDF : 120
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03

Climate Change: An Emerging Threat To Nigeria’s National Security

DOI:https://doi.org/10.18535/ijsrm/v6i11.sh02
Tochukwu Nwauba (1)
SH-2018-327-337
Abstract : 112
PDF : 134 XML : 53
DOI:https://doi.org/10.18535/ijsrm/v6i11.sh02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 143
PDF : 87
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

Secure Sockets Layer/Transport Layer Security for E-Commerce

DOI:https://doi.org/10.18535/ijsrm/v12i12.em03
CPA Dr. Leonard W. Wakoli (1)
8047-8052
Abstract : 713
PDF : 138
DOI:https://doi.org/10.18535/ijsrm/v12i12.em03

Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security

DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07
Sumiya Jahan Simu (1), Fardin Ibn Zaman (2)
999-1016
Abstract : 368
PDF : 105
DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07

Machine Learning Empowered Computer Networks

Santhosh K (1), Gary D (2), Chris C (3), Samyek N (4)
4861-4871
Abstract : 81
PDF : 57
DOI:
1 - 25 of 216 items 1 2 3 4 5 6 7 8 9 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved