• Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
  • Login
  • Register
logo
  • Login
  • Register
Skip to main content Skip to main navigation menu Skip to site footer
logo
  • Home
  • About
    • About the Journal
    • Editorial Team
    • Review Process
    • Open access
    • Digital Archiving Policy
    • Right and License
    • Reviewer Guideline
  • Submissions
  • Current Issue
  • Archives
  • Announcements
  • Contact
ISSN : 2321-3418
  1. Home /
  2. Search

Search

Advanced filters
1 - 25 of 26 items 1 2 > >> 

Harnessing Artificial Intelligence to Strengthen Intrusion Detection in Modern Network System

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05
Kamal Mohammed Najeeb Shaik (1)
2424-2433
Abstract : 254
PDF : 76
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec05

AI-Augmented Data Engineering Strategies for Real-Time Fraud Detection in Digital Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05
Narendra Devarasetty (1)
1038-1073
Abstract : 177
PDF : 133
DOI:https://doi.org/10.18535/ijsrm/v12i01.ec05

Strengthening Healthcare Data Security with Ai-Powered Threat Detection

DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02
Sabira Arefin (1)
1477-1483
Abstract : 1408
PDF : 248
DOI:https://doi.org/10.18535/ijsrm/v12i10.ec02

Designing Scalable Software Automation Frameworks for Cybersecurity Threat Detection and Response

DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03
Bhargav Dilipkumar Jaiswal (1)
1958-1980
Abstract : 482
PDF : 167
DOI:https://doi.org/10.18535/ijsrm/v13i02.ec03

Machine Learning Methods for Intrusion Detection: A Comprehensive Survey

DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07
Mobolaji Ogunbadejo (1), Oluwatobi Adedamola Ayilara-Adewale (2), Olanrewaju Alade (3)
2446-2456
Abstract : 169
PDF : 63
DOI:https://doi.org/10.18535/ijsrm/v13i07.ec07

AI-Augmented Vulnerability Discovery through Static Code Pattern Clustering in Micro services

DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01
Gopinath Kathiresan (1)
2145-2154
Abstract : 496
PDF : 140
DOI:https://doi.org/10.18535/ijsrm/v13i05.ec01

National Predictive Analytics Framework for Preventing Healthcare Fraud and Abuse

DOI:https://doi.org/10.18535/ijsrm/v13i11.m01
Abdul-Waliyyu Bello (1), Aishat Ojikutu (2)
657-671
Abstract : 89
PDF : 21
DOI:https://doi.org/10.18535/ijsrm/v13i11.m01

The Role of Artificial Intelligence in Predicting Cyber Threats

DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04
FNU Jimmy (1)
935-953
Abstract : 422
PDF : 274
DOI:https://doi.org/10.18535/ijsrm/v11i08.ec04

Graph-Based Models for Multi-Tenant Security in Cloud Computing

DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02
Sai Dikshit Pasham (1)
611-633
Abstract : 170
PDF : 90
DOI:https://doi.org/10.18535/ijsrm/v9i08.ec02

DETECTING OUTLIERS USING osPCA

J.Gnana Sekaran , P.Saranya (1)
Abstract : 112
PDF : 63
DOI:

Machine Learning for Enhancing Mortgage Origination Processes: Streamlining and Improving Efficiency

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02
Hariharan Pappil Kothandapani (1)
Abstract : 246
PDF : 106
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec02

AI-Enabled Statistical Process Control for Semiconductor Manufacturing Quality Improvement

DOI:https://doi.org/10.18535/ijsrm/v13i06.ec07
Gaurav Rajendra Parashare (1)
2279-2300
Abstract : 1119
PDF : 354
DOI:https://doi.org/10.18535/ijsrm/v13i06.ec07

Dynamic Adaptive API Security Framework Using AI-Powered Blockchain Consensus for Microservices

DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03
Deepak Kaul (1)
Abstract : 156
PDF : 60
DOI:https://doi.org/10.18535/ijsrm/v08i4.ec03

AI-Driven Data Governance Frameworks for Enhanced Privacy and Compliance

DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4
Narendra Devarasetty (1)
983-1006
Abstract : 435
PDF : 268
DOI:https://doi.org/10.18535/ijsrm/v11i02.ec4

Dynamic Audit Services for Outsourced Storages in Clouds

Devi Parvathy Mohan, K.J.Jagdish (1)
Abstract : 120
PDF : 83
DOI:

Digital Twins in IT: Enhancing System Monitoring and Predictive Maintenance

Gireesh Kambala (1)
1658-1674
Abstract : 154
PDF : 113
DOI:

Smart Defense: How Self-Learning AI Can Shield Bangladeshi Medical Records

DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02
Engr. Rajib Mazumder (1), Muhammad Anwar Hossain (2), Dr. Aparna Chakraborty (3)
1174-1180
Abstract : 245
PDF : 124
DOI:https://doi.org/10.18535/ijsrm/v12i05.ec02

Use of Artificial Intelligence in Medical Devices for Post-Market Surveillance

DOI:https://doi.org/10.18535/ijsrm/v12i08.ec05
Samadrita Ghosh (1)
1374-1387
Abstract : 487
PDF : 331
DOI:https://doi.org/10.18535/ijsrm/v12i08.ec05

Improving Distributed Cloud Data Engineering with AI-Powered Failure Prediction Systems

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec10
Dillep Kumar Pentyala (1)
1764-1787
Abstract : 147
PDF : 80
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec10

Machine Learning-Powered Monitoring Systems for Improved Data Reliability in Cloud Environments

Dillep Kumar Pentyala (1)
1854-1883
Abstract : 111
PDF : 77
DOI:

Cloudnymous Network and Data Security Model for Cloud

Roopa.V S.Sundararajan2 Dr.C.Emilin Shyni (1)
Abstract : 121
PDF : 74
DOI:

Deep Learning Techniques for Adaptive Resource Allocation and Data Reliability in Cloud Ecosystems

DOI:https://doi.org/10.18535/ijsrm/v12i02.ec12
Dillep Kumar Pentyala (1)
1095-1018
Abstract : 114
PDF : 90
DOI:https://doi.org/10.18535/ijsrm/v12i02.ec12

AIOps in cloud computing: Automation performance Monitoring with AI and New Relic

DOI:https://doi.org/10.18535/ijsrm/v10i3.ec08
Ravi chandra Thota (1)
809-817
Abstract : 195
PDF : 68
DOI:https://doi.org/10.18535/ijsrm/v10i3.ec08

Generative AI for Predictive Maintenance: Predicting Equipment Failures and Optimizing Maintenance Schedules Using AI

DOI:https://doi.org/10.18535/ijsrm/v12i11.ec03
Alma Mohapatra (1)
1648-1672
Abstract : 1412
PDF : 365
DOI:https://doi.org/10.18535/ijsrm/v12i11.ec03

Data-Driven Process Optimization Using AI and Statistical Methods in High-Tech Manufacturing

DOI:https://doi.org/10.18535/ijsrm/v12i12.ec09
Gaurav Rajendra Parashare (1)
1854-1874
Abstract : 227
PDF : 113
DOI:https://doi.org/10.18535/ijsrm/v12i12.ec09
1 - 25 of 26 items 1 2 > >> 

Metrics

Citations 3245
2yr mean_citedness 0.323
h index 21
i10 index 67
ICV 2024 88.02

Whatsapp

Join IJSRM.NET Channel

Make a Submission

Make a Submission

Author Desk

Author Guidelines Call for paper Publication fee Mode of Payment Indexing Publication Ethics Review Process Right and License Digital Archiving

Download

Manuscript Template Copyright form Journal Cover Page

i

Impact Factor : 6.997

Indexig

Indexing

  • WorldCat
  • Ivy Science
  • Google Schloar
  • OpenAlex.
  • ResearchGate
  • LivRe
  • Index Copernicus
  • ROAD
  • CrossRef Member
  • ScienceGate
  • Scite_ Index
  • Academia.Edu
  • Exaly
  • Advanced Sciences Index

Information

  • For Readers
  • For Authors
  • For Librarians

ABOUT US
IJSRM, the premier online destination for researchers, scholars, and innovators. Our platform provides a global network of professionals and experts....

HEAD OFFICE
24 Kialash Vihar
Mandsaur Near R.T.O. Office Mandsaur (M.P.) 458001 India
 
 
 

Quick Menu

  • Home
  • About Us
  • Current Issue
  • Archive
  • Open Access
  • Support & FAQs

Information for

  • Authors
  • Editors
  • Reviewers
  • Librarians
  • Researchers
  • Societies

Journal & Policies

  • Publication Ethics
  • Review Policy
  • Publication Ethics
  • Licensing and Copyright
  • Open Access Policy
  • Plagiarism Policy

Copyright © International Journal of Scientific Research and Management (IJSRM) - All Rights Reserved