International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Information Security: Page 2: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Information Security

Downloads: 114 | Views: 514

Information Security, Malaysia, Volume 6 Issue 12, December 2017

Pages: 1095 - 1098

Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah

Yassir Izzadin | Jamaludin Ibrahim

Downloads: 106 | Views: 629

Information Security, India, Volume 9 Issue 1, January 2020

Pages: 1383 - 1386

Data Security in Day to Day Life and Its Consequences: Case Study

Sandeep Saxena

Downloads: 105 | Views: 562

Information Security, India, Volume 8 Issue 1, January 2019

Pages: 2092 - 2096

An Secure Information Security Provenance Model for Controlling Spurious Drugs in Distributed Environment

Arun.R | Balaji.P | Vinod.D

Downloads: 104 | Views: 529

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2124 - 2126

Protecting Organization's Data through Penetration Testing

Prerak Doshi

Downloads: 101 | Views: 582

Information Security, India, Volume 6 Issue 12, December 2017

Pages: 1762 - 1765

Firewall and VPN Technology

Amruta Jagtap

Downloads: 72 | Views: 564

Information Security, Syria, Volume 6 Issue 7, July 2017

Pages: 2041 - 2045

Increasing Patients Privacy While Using Search Engines and Social Media Websites

Ahmad Sleiman Ahmad | Obadah Hammoud | Mothanna Alkubeily

Downloads: 71 | Views: 662

Information Security, India, Volume 10 Issue 3, March 2021

Pages: 357 - 360

Forensic Analysis Overview of Banking System Malware

Dnyandev Najan | Rajendra N Kokare | Vishal Pawade | Dr. Krishna Kulkarni

Downloads: 69 | Views: 2392

Information Security, United States, Volume 13 Issue 4, April 2024

Pages: 176 - 180

Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach

Megha Manglani

Downloads: 53 | Views: 411

Information Security, Uzbekistan, Volume 10 Issue 1, January 2021

Pages: 744 - 748

Optimal Asymmetric Data Encryption Algorithm

Kuryazov D.M.

Downloads: 46 | Views: 637

Information Security, India, Volume 10 Issue 1, January 2021

Pages: 1564 - 1572

Prevent the Eavesdropping in D2D Networks by Using Network Coding and Signal-To-Noise (SNR)

Yousef Ali Alshami | Shiv Kumar

Top