International Journal of Science and Research (IJSR)
Information Security
Downloads: 3 | Views: 387
Information Security, United States, Volume 13 Issue 6, June 2024
Pages: 890 - 895Preserving Patient Confidentiality: The Vital Role of Data Tokenization in Ensuring Data Security and Regulatory Compliance in Healthcare
Sivachandran Selvaraj
Downloads: 3 | Views: 325
Information Security, United States, Volume 9 Issue 4, April 2020
Pages: 1858 - 1865Diversity Analytics: Solving Subjective Business Problems with Analytics & Data Science
Gopal Krishna K Iyer | Kumrashan Indranil Iyer
Downloads: 2 | Views: 322
Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi | Dr. Mohammed Naif Alatawi
Downloads: 2 | Views: 367
Information Security, India, Volume 11 Issue 6, June 2022
Pages: 1655 - 1659Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture
Ujas Dhami | Nisarg Shah
Downloads: 2 | Views: 574
Information Security, India, Volume 12 Issue 4, April 2023
Pages: 176 - 178Cyber - Crime and Cyber Criminals: A Global Perspective
Meenakshi John | Jatin Kumar Lal | S. Dominic Rajkumar
Downloads: 2 | Views: 490
Information Security, India, Volume 12 Issue 4, April 2023
Pages: 1794 - 1799High Security Machine Learning Algorithm for Industrial IoT
Harshita Dubey
Downloads: 2 | Views: 298
Information Security, United States, Volume 13 Issue 3, March 2024
Pages: 1953 - 1955The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness
Santosh Kumar Kande
Downloads: 2 | Views: 163
Information Security, India, Volume 14 Issue 3, March 2025
Pages: 688 - 691Securing 3D Printing: Understanding the Hidden Risks of G-Code Manipulation in Additive Manufacturing
Vismit Sudhir Rakhecha (Druk)
Downloads: 1 | Views: 485
Information Security, India, Volume 11 Issue 2, February 2022
Pages: 148 - 151Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication
Ujas Dhami | Nisarg Shah
Downloads: 0 | Views: 366
Information Security, United States, Volume 11 Issue 2, February 2022
Pages: 1376 - 1377Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models
Santosh Kumar Kande