International Journal of Science and Research (IJSR)
Information Security
Downloads: 114 | Views: 514
Information Security, Malaysia, Volume 6 Issue 12, December 2017
Pages: 1095 - 1098Assessment of Cybersecurity Effectiveness in Serving Maqasid Al-Shariah
Yassir Izzadin | Jamaludin Ibrahim
Downloads: 106 | Views: 629
Information Security, India, Volume 9 Issue 1, January 2020
Pages: 1383 - 1386Data Security in Day to Day Life and Its Consequences: Case Study
Sandeep Saxena
Downloads: 105 | Views: 562
Information Security, India, Volume 8 Issue 1, January 2019
Pages: 2092 - 2096An Secure Information Security Provenance Model for Controlling Spurious Drugs in Distributed Environment
Arun.R | Balaji.P | Vinod.D
Downloads: 104 | Views: 529
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2124 - 2126Protecting Organization's Data through Penetration Testing
Prerak Doshi
Downloads: 101 | Views: 582
Information Security, India, Volume 6 Issue 12, December 2017
Pages: 1762 - 1765Firewall and VPN Technology
Amruta Jagtap
Downloads: 72 | Views: 564
Information Security, Syria, Volume 6 Issue 7, July 2017
Pages: 2041 - 2045Increasing Patients Privacy While Using Search Engines and Social Media Websites
Ahmad Sleiman Ahmad | Obadah Hammoud | Mothanna Alkubeily
Downloads: 71 | Views: 662
Information Security, India, Volume 10 Issue 3, March 2021
Pages: 357 - 360Forensic Analysis Overview of Banking System Malware
Dnyandev Najan | Rajendra N Kokare | Vishal Pawade | Dr. Krishna Kulkarni
Downloads: 69 | Views: 2392
Information Security, United States, Volume 13 Issue 4, April 2024
Pages: 176 - 180Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach
Megha Manglani
Downloads: 53 | Views: 411
Information Security, Uzbekistan, Volume 10 Issue 1, January 2021
Pages: 744 - 748Optimal Asymmetric Data Encryption Algorithm
Kuryazov D.M.
Downloads: 46 | Views: 637
Information Security, India, Volume 10 Issue 1, January 2021
Pages: 1564 - 1572Prevent the Eavesdropping in D2D Networks by Using Network Coding and Signal-To-Noise (SNR)
Yousef Ali Alshami | Shiv Kumar