International Journal of Science and Research (IJSR)
Information Security
Downloads: 250 | Views: 744
Information Security, India, Volume 8 Issue 11, November 2019
Pages: 95 - 101Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)
S K. Niamathulla
Downloads: 221 | Views: 870
Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Downloads: 162 | Views: 424
Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G
Downloads: 148 | Views: 522
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2678 - 2678Cyber Security - A Business Accelerator??
Riya V S | Dr. Aarthy C
Downloads: 144 | Views: 453
Information Security, Kenya, Volume 7 Issue 1, January 2018
Pages: 345 - 350Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza | Samuel Liyala | Solomon Ogara
Downloads: 134 | Views: 531
Information Security, India, Volume 8 Issue 5, May 2019
Pages: 814 - 818Cloud Based Secured and Energy Efficient IoT System
Shukla Ashish Shivbahadur | Dr. Ravi K. Sheth
Downloads: 132 | Views: 627
Information Security, Brazil, Volume 13 Issue 10, October 2024
Pages: 1205 - 1207Evolution of Compliance and Cybersecurity: A Risk Management Perspective in Financial Markets
Bruna Veiga
Downloads: 126 | Views: 395
Information Security, India, Volume 9 Issue 1, January 2020
Pages: 515 - 518Questioned Documents Analysis for Decipherment of Obliterated Writing
Harendra Kumar Bamburde | Dr. M. P. Goutam
Downloads: 119 | Views: 434
Information Security, India, Volume 7 Issue 12, December 2018
Pages: 1051 - 1053Web Security Problem and Web Service Attack
Simanshu Chaubey | Jaya Singh
Downloads: 118 | Views: 391
Information Security, India, Volume 6 Issue 4, April 2017
Pages: 1871 - 1875A Review of Image Encryption Using Chaos based Techniques
Shourya Chand | Ritik Aggarwal | Ekansh Dubey