International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Information Security: Page 2: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Information Security

Downloads: 112 | Views: 384

Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin | Jamaludin Ibrahim

Downloads: 106 | Views: 509

Information Security, India, Volume 9 Issue 1, January 2020

Pages: 1383 - 1386

Data Security in Day to Day Life and Its Consequences: Case Study

Sandeep Saxena

Downloads: 105 | Views: 457

Information Security, India, Volume 8 Issue 1, January 2019

Pages: 2092 - 2096

An Secure Information Security Provenance Model for Controlling Spurious Drugs in Distributed Environment

Arun.R | Balaji.P | Vinod.D

Downloads: 104 | Views: 430

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization's Data through Penetration Testing

Prerak Doshi

Downloads: 101 | Views: 489

Information Security, India, Volume 6 Issue 12, December 2017

Pages: 1762 - 1765

Firewall and VPN Technology

Amruta Jagtap

Downloads: 72 | Views: 465

Information Security, Syria, Volume 6 Issue 7, July 2017

Pages: 2041 - 2045

Increasing Patients Privacy While Using Search Engines and Social Media Websites

Ahmad Sleiman Ahmad | Obadah Hammoud | Mothanna Alkubeily

Downloads: 71 | Views: 468

Information Security, India, Volume 10 Issue 3, March 2021

Pages: 357 - 360

Forensic Analysis Overview of Banking System Malware

Dnyandev Najan | Rajendra N Kokare | Vishal Pawade | Dr. Krishna Kulkarni

Downloads: 53 | Views: 277

Information Security, Uzbekistan, Volume 10 Issue 1, January 2021

Pages: 744 - 748

Optimal Asymmetric Data Encryption Algorithm

Kuryazov D.M.

Downloads: 46 | Views: 481

Information Security, India, Volume 10 Issue 1, January 2021

Pages: 1564 - 1572

Prevent the Eavesdropping in D2D Networks by Using Network Coding and Signal-To-Noise (SNR)

Yousef Ali Alshami | Shiv Kumar

Downloads: 39 | Views: 386

Information Security, India, Volume 10 Issue 1, January 2021

Pages: 981 - 991

Review on Iris Recognition System for Unconstrained Environment

Harish Prajapati | Dr. Rajesh M. Bodade

Top