Journal articles on the topic 'International Journal of Computer Science and Information Security (IJCSIS)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'International Journal of Computer Science and Information Security (IJCSIS).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bayan, Almulhim, and Alghamdi Rami. "Effective Information Security Awareness Emails." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 1–2. https://doi.org/10.5281/zenodo.7505534.
Full textFahad, Jasim Alanezi. "Effective Information Security Policy." International Journal of Computer Science and Information Technology Research 12, no. 4 (2024): 1–4. https://doi.org/10.5281/zenodo.13892941.
Full textSiddiqui, Sana Afreen. "Analytical Study on Network Security Breach's." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 300–303. https://doi.org/10.5281/zenodo.3892611.
Full textJumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.
Full textMosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.
Full textAhangar, Adele, AlHawaeji Fahima Bab, Beheshti Moluksadat Hosseini, Najala Hariri, and Maryam Khademi. "Mapping and Analyzing the Conceptual Network Structure in the Field of Information Security." Journal of Information Processing and Management 37, no. 2 (2021): 473–96. https://doi.org/10.5281/zenodo.14039504.
Full textVivekThoutam. "Architectures of Intelligent Systems in Engineering." Biolife 8, no. 4 (2022): 8–14. https://doi.org/10.5281/zenodo.7407829.
Full textMD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.
Full textDr., E. J. Thomson Fedrik, Vinitha A., and Vanitha B. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1117–19. https://doi.org/10.31142/ijtsrd24020.
Full textJohara, Al Jarri, Alharthi Danyah, and Alquraishi Mashael. "Security Implications of Serverless Computing in the Cloud." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 1–4. https://doi.org/10.5281/zenodo.12634327.
Full textBayan, Almulhim, and Alghamdi Rami. "Strategy for Effective Awareness." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 53–54. https://doi.org/10.5281/zenodo.10166242.
Full textSherryl, W. Johnson. "Regulations for Securing Patient Data." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 3 (2023): 58–66. https://doi.org/10.5281/zenodo.10401160.
Full textOtieno, Godfrey Oduor. "Review of Home Automation Systems and Network Security using IoT." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 805–8. https://doi.org/10.5281/zenodo.3892664.
Full textTamim, Alabdali, and Alghamdi Abdulelah. "Password Security Threats and How to Protect Yourself." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 65–67. https://doi.org/10.5281/zenodo.6556648.
Full textMohammed, Mujtaba, A. Omair Aseel, A. Zowaid Rawan, and S. Ahmed Zaki. "Enhance Cyber Security with EDR and XDR Solutions." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 128–32. https://doi.org/10.5281/zenodo.8285623.
Full textEmad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.
Full textJunaid, Ahmed. Jan. "Credential Guard: Say Good Bye to Pass the Hash/Ticket Attacks." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 39–49. https://doi.org/10.5281/zenodo.7886224.
Full textLamia, T. AlSulaiman, F. Alturairi Jumana, and A. Al-Khathlan Khalid. "An Approach to Control Information Technology Changes." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 81–85. https://doi.org/10.5281/zenodo.7092060.
Full textBadi, Salah, Qahtani Badar, Jugaiman Mohammed, and Falah Saleh. "MITIGATING THREATS THROUGH APPLICATION PROGRAMMING INTERFACE INSPECTION AND MANIPULATION IN VMWARE VCENTER." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 137–40. https://doi.org/10.5281/zenodo.8315071.
Full textMohan, Prakash, and S. Nachappa. "Cloud Compliance with Encrypted Data – Health Records." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 1080–83. https://doi.org/10.5281/zenodo.3892865.
Full textFahad, Jasim Alanezi. "Social Engineering Attacks." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 68–70. https://doi.org/10.5281/zenodo.7656021.
Full textHassan, Jamal, A. Algeelani Nasir, and Al-Sammarraie Najeeb. "Advance Data-Privacy by Using Artificial Intelligence." International Journal of Computer Science and Information Technology Research 10, no. 4 (2022): 38–45. https://doi.org/10.5281/zenodo.7398762.
Full textOmar, Salim Abdullah, and ABDUL RAZZAQ EYADA ORAS. "Optoelectronic control systems: Technological principles to achieve software quality." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 87–90. https://doi.org/10.5281/zenodo.6619281.
Full textNorah, Alyousif, and Alhabis Sultan. "The Necessity of Multi Factor Authentication." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 46–49. https://doi.org/10.5281/zenodo.6472757.
Full textMohammed, Jassem Al-Sarraf. "Cyber Security and its role in achieving the future visions of the State of Kuwait." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 60–70. https://doi.org/10.5281/zenodo.7923877.
Full textPraveen, Borra. "Microsoft Fabric Review: Exploring Microsoft's New Data Analytics Platform." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 34–39. https://doi.org/10.5281/zenodo.11502585.
Full textDavid, Njuguna, and Kanyi Wambui. "An evaluation of BYOD integration cybersecurity concerns: A case study." An evaluation of BYOD integration cybersecurity concerns: A case study 9, no. 2 (2023): 80–91. https://doi.org/10.5281/zenodo.7704371.
Full textN.G.U.A, Nanumura. "Wi-Fi Data Analysis Based on Machine Learning." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 112–19. https://doi.org/10.5281/zenodo.8279998.
Full textProfessor, KABEYA TSHISEBA Cedric. "Principles underlying the authenticity of Blockchain transactions." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 2 (2023): 6–13. https://doi.org/10.5281/zenodo.7886085.
Full textYazeed, Al Moaiad, Mohamed Abdelrahman Tarshany Yasser, Ahmed Algeelani Nasir, and Al-Haithami Wafa. "Cyber Attack detection Using Big data analysis." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 26–33. https://doi.org/10.5281/zenodo.6924399.
Full textTaylor, Rodriguez Vance. "Geopolitical Implications of Artificial Intelligence in Cybersecurity: A Comprehensive Analysis." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 91–105. https://doi.org/10.5281/zenodo.8214594.
Full textProfessor, KABEYA TSHISEBA Cedric. "The blockchain as a cryptographic system." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 2 (2023): 1–5. https://doi.org/10.5281/zenodo.7886035.
Full textJagjot, Bhardwaj, and Gadiparthi Sivanagaraju. "Review of Real-Time Data Analytics: Transforming Emergency Telemedicine." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 62–68. https://doi.org/10.5281/zenodo.12591332.
Full textMuhammad, Fahad Athar. "The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 13–16. https://doi.org/10.5281/zenodo.13777211.
Full textShagufta, Farheen, and S. Vignesh. "A Review on the Repeated Use of Electronic Communications to Harass Someone Cyberstalking." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 979–83. https://doi.org/10.5281/zenodo.3892822.
Full textHemant, Sonawane. "Home Automation Life is One Click away from being better." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 349–52. https://doi.org/10.5281/zenodo.3892666.
Full textKABEYA, TSHISEBA Cedric. "Countermeasures to DDOS attacks based on amplification." International Journal of Novel Research in Computer Science and Software Engineering 9, no. 3 (2022): 29–32. https://doi.org/10.5281/zenodo.7491775.
Full textXuan, Hau Nguyen, and Son Tran Thai. "Video Forgery Detection: State-of-The-Art Review." International Journal of Recent Research in Mathematics Computer Science and Information Technology 9, no. 1 (2022): 1–9. https://doi.org/10.5281/zenodo.6536002.
Full textJundan, Wang. "Exploring the Impact of AI-Based Cloud Technology on Classroom Teaching: Opportunities and Challenges." International Journal of Computer Science and Information Technology Research 12, no. 1 (2024): 1–6. https://doi.org/10.5281/zenodo.10577654.
Full textOnuh, Ojoh. "A Comparative Analysis of the Influence of Artificial Intelligence Tools in Cybersecurity." International Journal of Recent Research in Mathematics Computer Science and Information Technology 11, no. 2 (2025): 32–52. https://doi.org/10.5281/zenodo.14620636.
Full textDlaim, Alqahtani. "Load Balancing with Priority Algorithm for Job Replications in Secure Computing Environments." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 50–61. https://doi.org/10.5281/zenodo.7056968.
Full textJezreel, Bernabe, Colos Racel, James De Leon Nikko, Keith Garcia Chester, and Veronica Romero Cayla. "LPU EIS: Equipment Information System for Lyceum of the Philippines University - Cavite." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 7–30. https://doi.org/10.5281/zenodo.8139237.
Full textAriwa, Rosemary Ngozi. "AWARENESS AND ACCEPTABILITY OF SINGLE SMART CARD TECHNOLOGY AMONG STUDENTS IN FEDERAL POLYTECHNIC BALI, TARABA STATE." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 1–6. https://doi.org/10.5281/zenodo.8113163.
Full textV, Srinadh, Sai Pyla Chetan, Sri Rama Ganesh Desaraju, Kiran Kumar Borra, and Divya Sai Bheemerasetty. "Online Voting System using Ethereum in Blockchain Technology." International Journal of Recent Research in Mathematics Computer Science and Information Technology 9, no. 2 (2022): 1–10. https://doi.org/10.5281/zenodo.7233830.
Full textTaylor, Rodriguez Vance. "Examination of Applications of Artificial Intelligence in Cybersecurity: Strengthening National Defense with AI." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 77–90. https://doi.org/10.5281/zenodo.8210374.
Full textOjiruwe, Benjamin Uzazo, and Al Moaiad Yazeed. "DETECTION AND PROTECTION ANALYSIS OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS USING CLUSTERING DATA MINING." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 25–28. https://doi.org/10.5281/zenodo.11382099.
Full textChandrasekhar, Gopisetti. "Credit Card Payments Processing using SAP Digital Payment Add-on for FIAR Process – Case Study." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 29–33. https://doi.org/10.5281/zenodo.11402346.
Full textDr., Khaled Khalifah Allanqawi, and HUSSEIN ALSAIDOMAR MOHAMMAD. "The Impact of Using ChatGPT on Cybersecurity & Social Engineering." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 42–52. https://doi.org/10.5281/zenodo.10142464.
Full textAttiogbé, Christian, Flavio Ferrarotti, and Sofian Maabout. "Advances and Challenges for Model and Data Engineering." JUCS - Journal of Universal Computer Science 27, no. 7 (2021): 646–49. http://dx.doi.org/10.3897/jucs.70972.
Full textDarkwa, Ernest, Bridget Acquah, and Constance Osafo-Adjei. "Navigating the Mass Media’s Political Agenda Setting Role: A Case Study of Ghana." Inverge Journal of Social Sciences 2, no. 4 (2023): 1–12. https://doi.org/10.63544/ijss.v2i4.53.
Full text