International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Information Security: Page 6: International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)

Information Security

Downloads: 3 | Views: 387

Information Security, United States, Volume 13 Issue 6, June 2024

Pages: 890 - 895

Preserving Patient Confidentiality: The Vital Role of Data Tokenization in Ensuring Data Security and Regulatory Compliance in Healthcare

Sivachandran Selvaraj

Downloads: 3 | Views: 325

Information Security, United States, Volume 9 Issue 4, April 2020

Pages: 1858 - 1865

Diversity Analytics: Solving Subjective Business Problems with Analytics & Data Science

Gopal Krishna K Iyer | Kumrashan Indranil Iyer

Downloads: 2 | Views: 322

Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021

Pages: 624 - 630

Secure Two Factor Authentication Framework based on Deep Learning

Talal Eid Alanzi | Dr. Mohammed Naif Alatawi

Downloads: 2 | Views: 367

Information Security, India, Volume 11 Issue 6, June 2022

Pages: 1655 - 1659

Effectuating Blockchain Network Compromise by Orchestrating a Daisy - Chain Architecture

Ujas Dhami | Nisarg Shah

Downloads: 2 | Views: 574

Information Security, India, Volume 12 Issue 4, April 2023

Pages: 176 - 178

Cyber - Crime and Cyber Criminals: A Global Perspective

Meenakshi John | Jatin Kumar Lal | S. Dominic Rajkumar

Downloads: 2 | Views: 490

Information Security, India, Volume 12 Issue 4, April 2023

Pages: 1794 - 1799

High Security Machine Learning Algorithm for Industrial IoT

Harshita Dubey

Downloads: 2 | Views: 298

Information Security, United States, Volume 13 Issue 3, March 2024

Pages: 1953 - 1955

The Role of Asset Inventory Accuracy in Vulnerability Remediation Effectiveness

Santosh Kumar Kande

Downloads: 2 | Views: 163

Information Security, India, Volume 14 Issue 3, March 2025

Pages: 688 - 691

Securing 3D Printing: Understanding the Hidden Risks of G-Code Manipulation in Additive Manufacturing

Vismit Sudhir Rakhecha (Druk)

Downloads: 1 | Views: 485

Information Security, India, Volume 11 Issue 2, February 2022

Pages: 148 - 151

Formulating Operating System Anonymization by Monolithic Keyring Subsystem Fabrication

Ujas Dhami | Nisarg Shah

Downloads: 0 | Views: 366

Information Security, United States, Volume 11 Issue 2, February 2022

Pages: 1376 - 1377

Beyond Baselines: Customizing Configuration Compliance for Industry-Specific Threat Models

Santosh Kumar Kande

Top