Works matching IS 27697851 AND DT 2025 AND VI 15 AND IP 1
1
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 166, doi. 10.54216/JCIM.150113
- Bollikonda, Vinod Babu;
- Kiran, K. V. D.
- Article
2
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 115, doi. 10.54216/JCIM.150110
- Mohanapriya M.;
- Anusuya, V.;
- Aravindhan, K.;
- Krishnaveni, N.;
- Santhosh, R.;
- Gowthami, D.
- Article
3
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 11, doi. 10.54216/JCIM.150102
- Fadhel, Zahraa;
- Attia, Hussien;
- Ali, Yossra Hussain
- Article
4
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 277, doi. 10.54216/JCIM.150122
- Kushwaha, Ajay;
- Pandey, Tushar Kumar;
- Kantha, B. Laxmi;
- Shukla, Prashant Kumar;
- Kumar, Sheo;
- Tiwari, Rajesh
- Article
5
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 211, doi. 10.54216/JCIM.150116
- Suneetha, Nallamothu;
- Satyanarayana, Penke
- Article
6
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 179, doi. 10.54216/JCIM.150114
- Matrood, Mohammed Qassim;
- Ali, Majid Hamid
- Article
7
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 133, doi. 10.54216/JCIM.150111
- Saravanan, K.;
- Santhosh, R.
- Article
8
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 151, doi. 10.54216/JCIM.150112
- Saraladeve L.;
- Chandrasekar A.;
- Nithya T.;
- N., Mohamed Imtiaz;
- Kalaiarasi S.;
- Sampathkumar, Balaji;
- Thanikachalam, Rajendran;
- J., Maria Arockia Dass
- Article
9
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 1, doi. 10.54216/JCIM.150101
- Mshet, Akram;
- Tayyeh, Huda
- Article
10
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 244, doi. 10.54216/JCIM.150119
- Ahmed, Wasan Saad;
- Mustafa AL-Ta'I, Ziyad Tariq
- Article
11
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 101, doi. 10.54216/JCIM.150109
- Geetha, S.;
- Vigenesh, M.;
- Santhosh, R.
- Article
12
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 50, doi. 10.54216/JCIM.150105
- Maheswaravenkatesh, P.;
- Nithya, K.;
- Kandasamy, V.;
- buri, R. Kiruba;
- Begum, A. Sumaiya
- Article
13
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 62, doi. 10.54216/JCIM.150106
- Jain, Himani;
- Dixit, Amit;
- Sharma, Aditi
- Article
14
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 365, doi. 10.54216/JCIM.150129
- Article
15
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 298, doi. 10.54216/JCIM.150124
- Divya, T. V.;
- Mohanty, Figlu
- Article
16
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 233, doi. 10.54216/JCIM.150118
- Mjeat, Salah N.;
- Yousif, Mohammed;
- Bader, Salim;
- Mohammed, Osama;
- Saeed, Ahmed Hikmat
- Article
17
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 89, doi. 10.54216/JCIM.150108
- Vasantha, Bhavani;
- Pradeepini, G.
- Article
18
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 34, doi. 10.54216/JCIM.150104
- Mohammed, Mohssen;
- Nour, Mohamed Abdalla;
- Elhoseny, Mohamed
- Article
19
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 342, doi. 10.54216/JCIM.150127
- Hajer, Muatamed Abed;
- Alasadi, Mustafa K.;
- Obied, Ali
- Article
20
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 270, doi. 10.54216/JCIM.150121
- Hamid, Nagham;
- Kaitan, Nada Mahdi;
- Mohsen, Sanaa
- Article
21
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 251, doi. 10.54216/JCIM.150120
- Article
22
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 314, doi. 10.54216/JCIM.150125
- Bhatt, Dhruv G.;
- Kyada, Parshad U.;
- Rathore, Rajkumar Singh;
- Nallakaruppan, M. K.;
- alotaibi, Faisal Mohammed;
- Jhaveri, Rutvij H.
- Article
23
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 288, doi. 10.54216/JCIM.150123
- Kiranbabu, M. N. V.;
- Viji, A. Jeraldine;
- Chandanan, Amit Kumar;
- Birchha, Vijay;
- Pandey, Tushar Kumar;
- Sar, Sumit Kumar
- Article
24
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 197, doi. 10.54216/JCIM.150115
- Sibe, Robinson Tombari;
- Bekom, David
- Article
25
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 77, doi. 10.54216/JCIM.150107
- Balajee R. M.;
- Kallam, Suresh;
- Jayanthi Kannan, M. K.
- Article
26
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 352, doi. 10.54216/JCIM.150128
- Rao, N. Kesava;
- Srinivas, G.;
- Prasad Reddy, P. V. G. D.
- Article
27
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 385, doi. 10.54216/JCIM.150130
- Rakad, Sarah H.;
- Radhi, Abdulkareem Merhej
- Article
28
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 332, doi. 10.54216/JCIM.150126
- Pandey, Sunil Kr;
- Shukla, Prashant Kumar;
- Pareek, Piyush Kumar;
- Mahapatra, Cosmena;
- Aggarwal, Puneet Kumar;
- Mamodiya, Udit
- Article
29
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 225, doi. 10.54216/JCIM.150117
- Ataala, Abdulrahman Fatikhan;
- Thamer, Khudhair Abed;
- Saeed, Ahmed Hikmat;
- Yousif, Mohammed;
- Salim, Ahmad;
- Alsultan, Qusay Hatem;
- Bader, Salim
- Article
30
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 22, doi. 10.54216/JCIM.150103
- Selvaraj, D.;
- Jasmine, J. Jeno;
- Ramani, R.;
- Dhinakaran, D.;
- Prabaharan, G.
- Article