International Journal of Science and Research (IJSR)
Information Security
Downloads: 3 | Views: 610
Information Security, India, Volume 11 Issue 1, January 2022
Pages: 371 - 376Anatomizing Relay Disintegration and Hop Operations of Tor
Ujas Dhami | Nisarg Shah
Downloads: 3 | Views: 430
Information Security, India, Volume 11 Issue 1, January 2022
Pages: 807 - 812Deriving Ransomware Formulation Complexity and Compromisation Topology
Ujas Dhami | Nisarg Shah
Downloads: 3 | Views: 540
Information Security, United States, Volume 13 Issue 6, June 2024
Pages: 890 - 895Preserving Patient Confidentiality: The Vital Role of Data Tokenization in Ensuring Data Security and Regulatory Compliance in Healthcare
Sivachandran Selvaraj
Downloads: 3 | Views: 459
Information Security, India, Volume 14 Issue 3, March 2025
Pages: 688 - 691Securing 3D Printing: Understanding the Hidden Risks of G-Code Manipulation in Additive Manufacturing
Vismit Sudhir Rakhecha (Druk)
Downloads: 3 | Views: 483
Information Security, United States, Volume 9 Issue 4, April 2020
Pages: 1858 - 1865Diversity Analytics: Solving Subjective Business Problems with Analytics & Data Science
Gopal Krishna K Iyer | Kumrashan Indranil Iyer
Downloads: 3 | Views: 234
Information Security, United States, Volume 14 Issue 9, September 2025
Pages: 538 - 544Enterprise Risk Management in the Healthcare Industry
Siddharth Pani
Downloads: 2 | Views: 448
Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi | Dr. Mohammed Naif Alatawi
Downloads: 2 | Views: 474
Information Security, India, Volume 11 Issue 6, June 2022
Pages: 1655 - 1659Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Ujas Dhami | Nisarg Shah
Downloads: 2 | Views: 751
Information Security, India, Volume 12 Issue 4, April 2023
Pages: 176 - 178Cyber - Crime and Cyber Criminals: A Global Perspective
Meenakshi John | Jatin Kumar Lal | S. Dominic Rajkumar
Downloads: 2 | Views: 585
Information Security, India, Volume 12 Issue 4, April 2023
Pages: 1794 - 1799High Security Machine Learning Algorithm for Industrial IoT
Harshita Dubey