Contents
Academic literature on the topic 'International Journal of Computer Science and Information Security (IJCSIS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'International Journal of Computer Science and Information Security (IJCSIS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "International Journal of Computer Science and Information Security (IJCSIS)"
Bayan, Almulhim, and Alghamdi Rami. "Effective Information Security Awareness Emails." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 1–2. https://doi.org/10.5281/zenodo.7505534.
Full textFahad, Jasim Alanezi. "Effective Information Security Policy." International Journal of Computer Science and Information Technology Research 12, no. 4 (2024): 1–4. https://doi.org/10.5281/zenodo.13892941.
Full textSiddiqui, Sana Afreen. "Analytical Study on Network Security Breach's." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 300–303. https://doi.org/10.5281/zenodo.3892611.
Full textJumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.
Full textMosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.
Full textAhangar, Adele, AlHawaeji Fahima Bab, Beheshti Moluksadat Hosseini, Najala Hariri, and Maryam Khademi. "Mapping and Analyzing the Conceptual Network Structure in the Field of Information Security." Journal of Information Processing and Management 37, no. 2 (2021): 473–96. https://doi.org/10.5281/zenodo.14039504.
Full textVivekThoutam. "Architectures of Intelligent Systems in Engineering." Biolife 8, no. 4 (2022): 8–14. https://doi.org/10.5281/zenodo.7407829.
Full textMD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.
Full textDr., E. J. Thomson Fedrik, Vinitha A., and Vanitha B. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1117–19. https://doi.org/10.31142/ijtsrd24020.
Full textJohara, Al Jarri, Alharthi Danyah, and Alquraishi Mashael. "Security Implications of Serverless Computing in the Cloud." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 1–4. https://doi.org/10.5281/zenodo.12634327.
Full textBooks on the topic "International Journal of Computer Science and Information Security (IJCSIS)"
Koblitz, Neal. Towards a Quarter-Century of Public Key Cryptography: A Special Issue of DESIGNS, CODES AND CRYPTOGRAPHY An International Journal. Volume 19, No. 2/3 (2000). Springer US, 2000.
Find full textConference papers on the topic "International Journal of Computer Science and Information Security (IJCSIS)"
Østby, Grethe, Bjørn Emil Selebø, and Stewart Kowalski. "Training the Trainers for Cybersecurity Exercises - Developing EXCON-teams." In 14th International Conference on Applied Human Factors and Ergonomics (AHFE 2023). AHFE International, 2023. http://dx.doi.org/10.54941/ahfe1003725.
Full text