International Journal of Science and Research (IJSR)
Information Security
Downloads: 37 | Views: 1232
Information Security, United States, Volume 13 Issue 4, April 2024
Pages: 176 - 180Compromised Systems, Compromised Data: A Technical Analysis of the Marriott Data Breach
Megha Manglani
Downloads: 36 | Views: 590
Information Security, United States, Volume 13 Issue 10, October 2024
Pages: 559 - 562A Comprehensive Framework for Offboarding Third Parties: Mitigating Data Risk and Ensuring Compliance
Vivek Kumar Agarwal
Downloads: 29 | Views: 418
Information Security, United States, Volume 14 Issue 2, February 2025
Pages: 835 - 838Enhancing Healthcare Security with AI-Driven Identity and Access Management
Mahendra Krishnapatnam
Downloads: 29 | Views: 149
Information Security, United States, Volume 14 Issue 5, May 2025
Pages: 1052 - 1057Preventing Cyberattacks on Smart Home Devices Using Machine Learning and Edge Computing
Siddharth Pani
Downloads: 20 | Views: 2157
Information Security, India, Volume 13 Issue 9, September 2024
Pages: 406 - 410Tracing the Impact of GDPR on Global Data Privacy
Khushal Chauhan | Mayur Ghawate | Saachi Joshi | Shrikant Kawade
Downloads: 17 | Views: 804
Information Security, United States, Volume 13 Issue 2, February 2024
Pages: 1872 - 1881Cloud - Based Ransomware Attack on US Financial Institutions: An In - depth Analysis of Tactics and Counter Measures
Oladipupo M. Dopamu
Downloads: 14 | Views: 329
Information Security, India, Volume 13 Issue 10, October 2024
Pages: 1285 - 1288Beyond the Radar: Understanding Wardriving's Impact on Corporate Espionage and Prevention Strategies
Vismit Sudhir Rakhecha (Druk)
Downloads: 9 | Views: 306
Information Security, India, Volume 13 Issue 3, March 2024
Pages: 520 - 523Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology
Dr. Ashok Kumar Yadav
Downloads: 9 | Views: 219
Information Security, United Arab Emirates, Volume 14 Issue 1, January 2025
Pages: 1008 - 1011Educational Programs as a Tool for Enhancing Security in Blockchain Ecosystems
Yaroslav Ivanov
Downloads: 9 | Views: 187
Information Security, United States, Volume 11 Issue 11, November 2022
Pages: 1545 - 1548SOAR Automation: Palo Alto Cortex XSOAR Playbooks for MISP Threat Intel Enrichment and TheHive Project Integration
Sandhya Guduru