International Journal of Science and Research (IJSR)
Information Security
Downloads: 6 | Views: 699
Information Security, India, Volume 7 Issue 11, November 2018
Pages: 1978 - 1982Strategic Construction and Implementation of Removable Media Policies for Mitigating Data Loss and Insider Threat Risks
Shanmugavelan Ramakrishnan
Downloads: 6 | Views: 363
Information Security, United States, Volume 14 Issue 4, April 2025
Pages: 907 - 911Cybersecurity Workforce Upskilling: CRISP-DM Automation with Jupyter Notebooks and Immersive Lab Terraform Modules
Sandhya Guduru
Downloads: 6 | Views: 289
Information Security, United States, Volume 14 Issue 9, September 2025
Pages: 534 - 537Blockchain Applications in Supply Chain Management: Literature Review and Identification of Research Gaps
Siddharth Pani
Downloads: 5 | Views: 742
Information Security, India, Volume 11 Issue 4, April 2022
Pages: 28 - 33Dominance of Hardware Firewalls and Denial of Firewall Attacks (Case Study BlackNurse Attack)
Thume Vamshi Krishna | Pulipati Karthik
Downloads: 5 | Views: 588
Information Security, India, Volume 12 Issue 2, February 2023
Pages: 88 - 98Digital Medical Passport using Blockchain Technology
Akash Sadamwar
Downloads: 5 | Views: 782
Information Security, United States, Volume 11 Issue 11, November 2022
Pages: 1496 - 1501Human Resource Management with IAM
Sampath Talluri
Downloads: 5 | Views: 395
Information Security, Malaysia, Volume 13 Issue 8, August 2024
Pages: 738 - 747Assessing Cybersecurity Threats and Awareness in Bosaso's Banking and Telecom Sectors
Mohamed Abdirisak Buraale | Dr. Tiktik Khawa Abdurrahman | Dr. Fazilah Che Fauzi
Downloads: 5 | Views: 512
Information Security, United States, Volume 10 Issue 10, October 2021
Pages: 1667 - 1673Future of Analytics: Are AI and ML Going to Replace Analytics as We Know It?
Gopal Krishna K Iyer | Kumrashan Indranil Iyer
Downloads: 4 | Views: 774
Information Security, India, Volume 10 Issue 12, December 2021
Pages: 77 - 79Ideal Architecture for Security Operation Center Complementing Data Centers: An Overview
Ankit Srivastava | Jatin Nagpal
Downloads: 4 | Views: 634
Information Security, Saudi Arabia, Volume 10 Issue 11, November 2021
Pages: 410 - 415Performance Analysis of Cryptography Algorithms in Wireless Sensor Network Based on Key Strength and Data Acceptance Probabilities
Mohammed Alwakeel | Sultan Swailem Alatawi