• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 209 items 1 2 3 4 5 6 7 8 9 > >> 

Influence of Organizational Security Learning Practices on Insider Security Threats in SoCs in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i08.em04
Charles Mwenda Ikiara (1), Dr. Boniface Ratemo (2), Dr. George Musumba (3)
7027-7035
Abstract : 220
PDF : 64
DOI:https://doi.org/10.18535/ijsrm/v12i08.em04

Factors Influencing Information Security Culture in Organizations Dealing With Economic Crime in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em12
John Onyango Abingo (1), Dr. George Musumba (2), Dr.Anthony Maina Mbuki (3)
8141-8149
Abstract : 208
PDF : 58
DOI:https://doi.org/10.18535/ijsrm/v12i12.em12

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 2009
PDF : 1155
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 80
PDF : 33
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 345
PDF : 78
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 345
PDF : 107
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

A Review of The Literature on An Examination of The Effects of Cyber Security in Improved Public Sector Institution Performance in Jordan

DOI:https://doi.org/10.18535/ijsrm/v12i06.ec03
Alanoud Amer Saleem Alrkeebat (1)
1266-1273
Abstract : 79
PDF : 42
DOI:https://doi.org/10.18535/ijsrm/v12i06.ec03

Reflecting on the Impacts of the 2013 coup in Central Africa Republic on Economic Security

DOI:https://doi.org/10.18535/ijsrm/v10i2.sh02
Jonah Marawako (1)
940-958
Abstract : 66
PDF : 104
DOI:https://doi.org/10.18535/ijsrm/v10i2.sh02

Enhancing Software Security: A Research-Driven Automation Framework

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03
Pushpalika Chatterjee (1), Apurba Das (2)
1793-1803
Abstract : 275
PDF : 44
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 72
PDF : 32
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Factors That Influence the Uptake of an M-Pesa Security System among Mpesa Agents In Nairobi County

DOI:https://doi.org/10.18535/ijsrm/v13i05.as01
Irene Sitawa Sichangi (1)
111-117
Abstract : 138
PDF : 15 PDF : 19
DOI:https://doi.org/10.18535/ijsrm/v13i05.as01

Understanding Turnover Intention: Exploring the Influence of Job Security, Perceived Organizational Support, and Job Satisfaction as a Mediator

DOI:https://doi.org/10.18535/ijsrm/v11i12.em11
Diana Nafishah Putri (1), Fatmah Bagis (2), Naelati Tubastuvi (3), Hengky Widhiandono (4)
5614-5630
Abstract : 603
PDF : 246
DOI:https://doi.org/10.18535/ijsrm/v11i12.em11

Influence Of Web Security Decisions By Hci Models

K. Akhil . (1)
Abstract : 33
PDF : 22
DOI:

Network Security Issues and Tools for Testing Security in Computer Network.

Rachit Gupta, ShwetanakSaurabh, Neeraj Kumar (1)
Abstract : 35
PDF : 34
DOI:

Factors That Influence Cybersecurity Compliance Behaviours by Bank Employees: A Case of Banks Operating In Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em02
CPA Dr. Leonard W. Wakoli (1)
8037-8046
Abstract : 926
PDF : 86
DOI:https://doi.org/10.18535/ijsrm/v12i12.em02

Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight

DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05
Gourav Nagar (1)
78-94
Abstract : 169
PDF : 52
DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 450
PDF : 497
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 935
PDF : 132
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Secured Auto Encryption and Authentication Process for Cloud Computing Security

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03
Mst Zannatun Ferdus (1), Mst Zannatun Ferdus (2), Md. Hasan Monsur (3), Mst. Jahanara Akhtar (4), Saiful Islam (5)
1040-1044
Abstract : 275
PDF : 102
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec03

Climate Change: An Emerging Threat To Nigeria’s National Security

DOI:https://doi.org/10.18535/ijsrm/v6i11.sh02
Tochukwu Nwauba (1)
SH-2018-327-337
Abstract : 83
PDF : 99 XML : 39
DOI:https://doi.org/10.18535/ijsrm/v6i11.sh02

Enhancing Cloud Security: Implementing Zero Trust Architectures in Multi-Cloud Environments

DOI:https://doi.org/10.18535/ijsrm/v4i9.22
Pavan Muralidhara (1), Vaishnavi Janardhan (2)
4636-4664
Abstract : 110
PDF : 59
DOI:https://doi.org/10.18535/ijsrm/v4i9.22

Secure Sockets Layer/Transport Layer Security for E-Commerce

DOI:https://doi.org/10.18535/ijsrm/v12i12.em03
CPA Dr. Leonard W. Wakoli (1)
8047-8052
Abstract : 662
PDF : 94
DOI:https://doi.org/10.18535/ijsrm/v12i12.em03

Advanced Cybersecurity Strategies for Protecting Critical Infrastructure: Strengthening the Backbone of National Security

DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07
Sumiya Jahan Simu (1), Fardin Ibn Zaman (2)
999-1016
Abstract : 303
PDF : 73
DOI:https://doi.org/10.18535/ijsrm/v11i12.ec07

Machine Learning Empowered Computer Networks

Santhosh K (1), Gary D (2), Chris C (3), Samyek N (4)
4861-4871
Abstract : 53
PDF : 38
DOI:

Security Challenges for Digital Transformation in Saudi Arabia

DOI:https://doi.org/10.18535/ijsrm/v10i6.ec01
Khalid Assiri (1), Khalid Almdani (2), Hassan Al Saeedi (3), Abdullah Softah (4), Sultan Khogeer (5)
871-880
Abstract : 180
PDF : 221
DOI:https://doi.org/10.18535/ijsrm/v10i6.ec01
1 - 25 of 209 items 1 2 3 4 5 6 7 8 9 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved