• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 17 of 17 items

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 304
PDF : 117
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 530
PDF : 184
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

The Role of Artificial Intelligence in Predicting Cyber Threats

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04
FNU Jimmy (1)
935-953
Abstract : 441
PDF : 289
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1555
PDF : 272
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

A Comprehensive Framework for Threat Intelligence-Driven Incident Detection

DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01
Saravanakumar Baskaran (1)
288-293
Abstract : 172
PDF : 89
DOI:https://doi.org/10.18535/ijsrm/v7i8.ec01

Bridging Borders with AI: Enhancing Global Cybersecurity Through Intelligent Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec11
Goutham Sunkara (1)
2352-2363
Abstract : 176
PDF : 88
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec11

Impact Of Web (URL) Phishing and Its Detection

DOI:https://doi.org/10.18535/ijsrm/v12i04.m02
Kunle Oloyede (1), Chinenye Obunadike (2), Simo Yufenyuy (3), Emmanuel Elom (4), Abdul-Waliyyu Bello (5), Somtobe Olisah (6), Callistus Obunadike (7), Oluwadamilola Ogunleye (8), Sulaimon Adeniji (9)
484-493
Abstract : 426
PDF : 192
DOI:https://doi.org/10.18535/ijsrm/v12i04.m02

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 167
PDF : 62
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 262
PDF : 137
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Plant Disease Detection and Monitoring Using Artificial Neural Network

DOI:https://doi.org/10.18535/ijsrm/v10i1.ec01
Stella I. Orakwue (1), Nkolika O. Nwazor (2)
715-722
Abstract : 208
PDF : 111
DOI:https://doi.org/10.18535/ijsrm/v10i1.ec01

The Evolution of Ransomware: Tactics, Techniques, and Mitigation Strategies

DOI:https://doi.org/10.18535/ijsrm/v12i06.ec09
Gourav Nagar (1)
1282-1298
Abstract : 1217
PDF : 524
DOI:https://doi.org/10.18535/ijsrm/v12i06.ec09

Robust Detection of Fake News Using LSTM and GloVe Embeddings

DOI:https://doi.org/10.18535/ijsrm/v10i6.ec06
Alex Lee (1), Xiang Chen (2), Ivy Wood (3)
929-941
Abstract : 258
PDF : 94
DOI:https://doi.org/10.18535/ijsrm/v10i6.ec06

Cybersecurity Threats and Vulnerabilities in Online Banking Systems

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10
FNU Jimmy (1)
1631-1646
Abstract : 1111
PDF : 1507
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec10

Social Engineering Attacks in US Healthcare: A Critical Analysis of Vulnerabilities and Mitigation Strategies

DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03
Obi Marizu (1)
928-939
Abstract : 402
PDF : 321
DOI:https://doi.org/10.18535/ijsrm/v10i9.ec03

Emerging Threats: The Latest Cybersecurity Risks and the Role of Artificial Intelligence in Enhancing Cybersecurity Defenses

DOI:https://doi.org/10.18535/ijsrm/v9i2.ec01
Fnu Jimmy (1)
564-574
Abstract : 1306
PDF : 553
DOI:https://doi.org/10.18535/ijsrm/v9i2.ec01

Leveraging Artificial Intelligence to Automate and Enhance Security Operations: Balancing Efficiency and Human Oversight

DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05
Gourav Nagar (1)
78-94
Abstract : 318
PDF : 128
DOI:https://doi.org/10.18535/ijsrm/v6i7.ec05

Pulmonary Tuberculosis (PTB) Prevalence & Factors in Diabetic Patients with Poor Glycemic Control In Mwanza

DOI:https://doi.org/10.18535/ijsrm/v12i02.mp02
Sr. Gotfrida Marandu (1), Gaston Ng'onyanyi (2), Paul Alikado Sabuni (3)
990-998
Abstract : 512
PDF : 101
DOI:https://doi.org/10.18535/ijsrm/v12i02.mp02
1 - 17 of 17 items

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved