• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 32 items 1 2 > >> 

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 133
PDF : 50
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

Factors Influencing Information Security Culture in Organizations Dealing With Economic Crime in Kenya

DOI:https://doi.org/10.18535/ijsrm/v12i12.em12
John Onyango Abingo (1), Dr. George Musumba (2), Dr.Anthony Maina Mbuki (3)
8141-8149
Abstract : 287
PDF : 107
DOI:https://doi.org/10.18535/ijsrm/v12i12.em12

A Systematic Literature Review on the Cyber Security

DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04
Dr.Yusuf Perwej (1), Syed Qamar Abbas (2), Jai Pratap Dixit (3), Dr. Nikhat Akhtar (4), Anurag Kumar Jaiswal (5)
669-710
Abstract : 2308
PDF : 1476
DOI:https://doi.org/10.18535/ijsrm/v9i12.ec04

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 444
PDF : 131
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Enhancing Software Security: A Research-Driven Automation Framework

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03
Pushpalika Chatterjee (1), Apurba Das (2)
1793-1803
Abstract : 335
PDF : 72
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec03

The Legal Conundrum Of Non-Interest Banking. A Case Study Of Islamic Bank In Nigeria.

DOI:https://doi.org/10.18535/ijsrm/v7i7.lla02
Miebaka Nabiebu (1), Michael Takim Otu (2)
141-152
Abstract : 306
PDF : 69 XML : 66
DOI:https://doi.org/10.18535/ijsrm/v7i7.lla02

Zero Trust Security: Reimagining Cyber Defense for Modern Organizations

DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11
FNU Jimmy (1)
887-905
Abstract : 457
PDF : 162
DOI:https://doi.org/10.18535/ijsrm/v10i4.ec11

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 151
PDF : 67
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

Factors That Influence the Uptake of an M-Pesa Security System among Mpesa Agents In Nairobi County

DOI:https://doi.org/10.18535/ijsrm/v13i05.as01
Irene Sitawa Sichangi (1)
111-117
Abstract : 229
PDF : 58 PDF : 138
DOI:https://doi.org/10.18535/ijsrm/v13i05.as01

The Opposite of War is Not Peace: The Complex Realities of 21st Century Conflict

DOI:https://doi.org/10.18535/ijsrm/v13i09.ps.01
Oluyemi Opeoluwa Adisa (1), Kareem Shwan Adham (2)
147-161
Abstract : 105
PDF : 10
DOI:https://doi.org/10.18535/ijsrm/v13i09.ps.01

DATA PRIVACY AND REGULATORY COMPLIANCE IN THE USA: A CALL FOR A CENTRALIZED REGULATORY FRAMEWORK

DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01
Olumide Ajayi (1)
573-584
Abstract : 758
PDF : 156
DOI:https://doi.org/10.18535/ijsrm/v12i12.lla01

AI-Augmented Vulnerability Discovery through Static Code Pattern Clustering in Micro services

DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01
Gopinath Kathiresan (1)
2145-2154
Abstract : 434
PDF : 121
DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 222
PDF : 99
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

A Comprehensive Framework for Threat Intelligence-Driven Incident Detection

DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01
Saravanakumar Baskaran (1)
288-293
Abstract : 126
PDF : 64
DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01

Zero Trust Architecture and Business Risk Alignment: Comprehensive Governance Framework, Implementation Methodologies, and Future Security Trends for Enterprise Environments

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec13
Abiola Olomola (1)
Abstract : 119
PDF : 175
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec13

Transforming Supplier Audits with AI: A Risk-Based Approach in Medical Devices

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec06
Binitkumar M Vaghani (1)
1695-1713
Abstract : 392
PDF : 486
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec06

An Integrated PMT-TAM Approach to Cybersecurity Awareness: Evidence from Sierra Leone's Universities and Policy Lessons for Developing Nations

DOI:https://doi.org/10.18535/ijsrm/v13i08.ec06
Mohamed Koroma (1), Mohamed Syed Fofanah (2), Maurice Sesay (3), Ibrahim Abdulai Sawaneh (4)
2587-2614
Abstract : 125
PDF : 48
DOI:https://doi.org/10.18535/ijsrm/v13i08.ec06

Advanced Database Strategies for Multi-Location Environments: Privacy, Security, and AI Integration

DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02
Karthick Ramachandran (1)
2377-2385
Abstract : 404
PDF : 107
DOI:https://doi.org/0.18535/ijsrm/v13i07.ec02

Scenario Planning Analysis of BPJS Kesehatan in Facing the Deficit of Social Security Fund for Health

DOI:https://doi.org/10.18535/ijsrm/v13i05.em19
Luqman Azis (1), Dr. Ir. Rina Djunita Pasaribu, M.Sc., CPM., EPC (2), Dr. M. Riza Sutjipto (3)
9941-9150
Abstract : 302
PDF : 119
DOI:https://doi.org/10.18535/ijsrm/v13i05.em19

Bridging The Gap Between Data-Driven Decision Making and Human-Centric Management in Organisations

DOI:https://doi.org/10.18535/ijsrm/v13i03.ec06
Olanrewaju Alade (1), Mobolaji Ogunbadejo (2), Oluwatobi Adedamola Ayilara-Adewale (3), Ayodeji Julius Sokunbi (4)
2103-2112
Abstract : 150
PDF : 97
DOI:https://doi.org/10.18535/ijsrm/v13i03.ec06

Scalable Python Tools for Managing OTA Updates in Automotive Systems

DOI:https://doi.org/10.18535/ijsrm/v11i05.ec2
Karthikeyan Palanichamy (1)
904-928
Abstract : 190
PDF : 126
DOI:https://doi.org/10.18535/ijsrm/v11i05.ec2

AI-Driven Vulnerability Management and Automated Threat Mitigation

DOI:https://doi.org/10.18535/ijsrm/v10i10.ec05
Venkata Bhardwaj Komaragiri (1), Andrew Edward (2)
980-998
Abstract : 329
PDF : 333
DOI:https://doi.org/10.18535/ijsrm/v10i10.ec05

Cybersecurity risk management in the industry 4.0

DOI:https://doi.org/10.18535/ijsrm/v10i3.ec01
Pedro Brandao (1), Paulo Duarte Branco (2)
747-754
Abstract : 278
PDF : 129
DOI:https://doi.org/10.18535/ijsrm/v10i3.ec01

REX–K3L: A Novel Approach for Neuromimetic and Contextual Machine Logic

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec04
Abdelkrim Fellouri (1), Meriem Adjailia (2)
2406-2423
Abstract : 338
PDF : 63
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec04

Innovative Approaches to Preventing Major Industrial Accidents: A Comprehensive Custom Risk-Specific HSSEQ Management Framework

DOI:https://doi.org/10.18535/ijsrm/v13i06.c04
Zeynep Bahar (1), Prof. Dr. Havva Duygu Bilgen (2), Orcun Sarioguz (3)
302-312
Abstract : 44
PDF : 12
DOI:https://doi.org/10.18535/ijsrm/v13i06.c04
1 - 25 of 32 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved