International Journal of Science and Research (IJSR)
Information Security
Downloads: 11 | Views: 762
Information Security, Singapore, Volume 13 Issue 11, November 2024
Pages: 183 - 184Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Downloads: 10 | Views: 634
Information Security, United States, Volume 9 Issue 12, December 2020
Pages: 1893 - 1898DevSecOps Automation: SAST/DAST Integration in GitLab CI/CD with Semgrep, OWASP ZAP, and Dependency-Check
Sandhya Guduru
Downloads: 10 | Views: 397
Information Security, United States, Volume 10 Issue 5, May 2021
Pages: 1383 - 1382Automated Policy Enforcement in DevSecOps: OPA, Kyverno, and Tekton Chains for Supply Chain Integrity
Sandhya Guduru
Downloads: 9 | Views: 501
Information Security, India, Volume 13 Issue 3, March 2024
Pages: 520 - 523Protecting the Digital Frontier: Understanding Cybersecurity Challenges and Innovations in the Age of Technology
Dr. Ashok Kumar Yadav
Downloads: 9 | Views: 423
Information Security, United States, Volume 13 Issue 7, July 2024
Pages: 371 - 376Utilizing Artificial Intelligence for Patient Risk Predictions: Empowering Doctors with Data - Driven Insights
Sivachandran Selvaraj
Downloads: 9 | Views: 401
Information Security, United Arab Emirates, Volume 14 Issue 1, January 2025
Pages: 1008 - 1011Educational Programs as a Tool for Enhancing Security in Blockchain Ecosystems
Yaroslav Ivanov
Downloads: 8 | Views: 621
Information Security, United States, Volume 13 Issue 10, October 2024
Pages: 1001 - 1002A Novel Methodology for Tracking and Remediating Third - Party Data Breaches
Vivek Kumar Agarwal
Downloads: 7 | Views: 379
Information Security, India, Volume 13 Issue 8, August 2024
Pages: 1073 - 1078An Algorithm based on Deep Learning for Intrusion Detection in IoT
Zoya Firdouse | K. Jayasree
Downloads: 7 | Views: 554
Information Security, United States, Volume 13 Issue 3, March 2024
Pages: 1953 - 1955The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness
Santosh Kumar Kande
Downloads: 6 | Views: 549
Information Security, India, Volume 10 Issue 10, October 2021
Pages: 1421 - 1426From Digital India to Digital Economy: Understanding India's Cyber Infrastructure and Cyber Security
Roshan Rai