Skip to main content Skip to main navigation menu Skip to site footer
Publisher
  • About Al-Kindi
  • Our services
  • All journals
  • Our Partners
  • Publish with us
  • Register
  • Login

Journal of Computer Science and Technology Studies

Journal of Computer Science and Technology Studies
  • Journal Overview
    • About journal
    • Author's Guidelines
    • Article Processing Charges
    • Peer Review Process
    • Publication Ethics
    • Policies
    • Why Publish with us?
  • Editorial Team
  • Indexing
  • Latest issue
  • All issues
  • Announcements
  • Contact us
  1. Home /
  2. Search

Search

Related contents

About Journal
Latest issue
All issues
Submit your paper
Contact the journal
Advanced filters
Published After
Published Before

Search Results

  • Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights

    Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, Sanjida Akter Sarna
    2025-05-12
  • Generative AI: A New Challenge for Cybersecurity

    Mingzheng Wang
    2024-04-07
  • AI-Driven Cybersecurity: Balancing Advancements and Safeguards

    Atia Shahana, Rakibul Hasan, Sayeda Farjana Farabi, Jahanara Akter, Md Abdullah Al Mahmud, Fatema Tuz Johora, Gurkan Suzer
    2024-05-10
  • Advanced Machine Learning Techniques for Cybersecurity: Enhancing Threat Detection in US Firms

    Mita Khatun, Mahjabin Siddika Oyshi
    2025-04-23
  • Advanced Cyber Threats and Cybersecurity Innovation - Strategic Approaches and Emerging Solutions

    Jobanpreet Kaur, Syed Nazmul Hasan, Shuchona Malek Orthi, Md Alamgir Miah, Mohammad Abdul Goffer, Clinton Ronjon Barikdar, Jahid Hassan
    2023-07-20
  • Data-Driven Security: Improving Autonomous Systems through Data Analytics and Cybersecurity

    Inshad Rahman Noman, Joy Chakra Bortty, Kanchon Kumar Bishnu, Md Munna Aziz, Md Rashedul Islam
    2022-12-25
  • Ethical Hacking and Penetration Testing – How Organizations Use Ethical Hackers to Strengthen Security

    Supom Roy, Ornab Banik
    2025-05-27
  • AI-Based Intrusion Detection & Prevention Models for Smart Home IoT Systems: A Literature Review

    Jayveersinh Vansiya, Asha Chandi, Rashid A Khan
    2025-05-24
  • Next-Generation Cyber Threat Detection and Mitigation Strategies: A Focus on Artificial Intelligence and Machine Learning

    Md Rasheduzzaman Labu, Md Fahim Ahammed
    2024-02-13
  • Fortifying the Future: Defending Machine Learning Systems from AI-Powered Cyberattacks

    Gresshma Atluri
    2025-05-10
  • Securing the Digital Core: Cybersecurity Challenges and Strategies in SAP ERP Systems

    Krupal Gangapatnam
    2025-05-03
  • Detecting IoT Cyberattacks: Advanced Machine Learning Models for Enhanced Security in Network Traffic

    Md Rashed Buiya, A K M Nuruzzaman Laskar, Md Rafiqul Islam, Sanjib Kumar Shil, Muhammad Shoyaibur Rahman Chowdhury, Reza E Rabbi Shawon, Md Sumsuzoha
    2024-10-18
  • AI-Driven Risk Assessment in National Security Projects: Investigating machine learning models to predict and mitigate risks in defense and critical infrastructure projects

    Md Habibul Arif, Habibor Rahman Rabby, Nusrat Yasmin Nadia, Md Iftekhar Monzur Tanvir, Abdullah Al Masum
    2025-04-05
  • Graph Databases: Revolutionizing Fraud Detection and Cybersecurity in Financial Services

    Muthuselvam Chandramohan
    2025-05-30
  • Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks

    Tahir Bashir
    2024-09-23
  • Evaluating the Effectiveness of AI-Driven Threat Intelligence Systems: A Technical Analysis

    RAJESH RAJAMOHANAN NAIR
    2025-05-07
  • The Role of AI-Enhanced Personalization in Customer Experiences

    Mohammad Shafiquzzaman Bhuiyan
    2024-02-01
  • Convolutional Neural Networks Based Detection System for Cyber-attacks in Industrial Control Systems

    MD KHOKAN BHUYAN, Md Kamruzzaman, Sadia Islam Nilima , RABEYA KHATOON, Nur Mohammad
    2024-08-07
  • Proactive Cyber Threat Detection Using AI and Open-Source Intelligence

    Jafrin Reza, Md Imran Khan, Sanjida Akrer Sarna
    2025-06-03
  • The Role of Databases in Cybersecurity and Threat Detection: Advancements through Spanner Graph Technology

    Pushap Goyal
    2025-06-03
  • The Evolution and Impact of Connected Vehicle Data Systems

    Lavanya Jacintha Victor
    2025-05-02
  • Digital Transformation in Governance: The Impact of e-governance on Public Administration and Transparency

    Shabnam Sharmin, Rakibul Hasan Chowdhury
    2025-03-16
  • Demystifying the MITRE ATT&CK Framework: A Practical Guide to Threat Modeling

    Vilas Shewale
    2025-05-02
  • Securing the Modern Healthcare Ecosystem: Endpoint Management for Medical Environments

    Sri Harsha Koneru
    2025-05-10
  • AI-Driven Incident Response for Digital Forensics and Incident Response: A Comprehensive Framework

    Santosh Datta Bompally
    2025-04-25
  • Proactive Security with AI: Revolutionizing Cloud Infrastructure Protection

    Krupal Gangapatnam
    2025-05-03
  • Securing Retrieval-Augmented Generation Pipelines: A Comprehensive Framework

    Siddharth Nandagopal
    2025-01-12
  • Advanced Cybercrime Detection: A Comprehensive Study on Supervised and Unsupervised Machine Learning Approaches Using Real-world Datasets

    Duc M Cao, Md Abu Sayed, Md Tanvir Islam, Md Tuhin Mia, Eftekhar Hossain Ayon, Bishnu Padh Ghosh, Rejon Kumar Ray, Aqib Raihan
    2024-01-02
  • Cloud Security in Financial Services: Implementing Scalable and Compliant Multi-Cloud Architectures

    Arunkumarreddy Yalate
    2025-05-14
  • Identity and Access Management Transformation in Large Enterprises: A Case Study Analysis

    Vasu Sunil Kumar Grandhi
    2025-06-01
  • Multi-Layer Security Architecture for Cloud-Connected Autonomous Systems

    Mathew Sebastian
    2025-05-08
  • The Evolution of Smart Factories: Integrating IOT and Machine Learning in Supply Chain and Manufacturing

    Akash Kadam, Diwakar Reddy Peddinti, Aditya Gupta
    2025-05-31
  • A Comparative Study of Machine Learning Models for Predicting Customer Churn in Retail Banking: Insights from Logistic Regression, Random Forest, GBM, and SVM

    Md Parvez Ahmed, Md Arif, Abdullah Al Mamun, Fuad Mahmud, Tauhedur Rahman, Md Jamil Ahmmed, Sanjida Nowshin Mou, Pinky Akter, Muhammad Shoyaibur Rahman Chowdhury, Md Kafil Uddin
    2024-10-08
  • Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation

    Narendra Chennupati
    2025-05-07
  • The Synergy of Human and AI Collaboration in Modern Network Management

    Manevannan Ramasamy
    2025-05-10
  • Zero Trust Security for AI-Driven Payment Systems in Multi-Cloud Environments

    Soma Kiran Kumar Nellipudi
    2025-06-04
  • AI-Driven Machine Learning for Fraud Detection and Risk Management in U.S. Healthcare Billing and Insurance

    Raktim Dey, Ashutosh Roy, Jasmin Akter, Aashish Mishra, Malay Sarkar
    2025-02-12
  • Demystifying Zero Trust Security: The No-Trust Network Paradigm

    Vaibhav Anil Vora
    2025-05-01
  • Autonomous Zero Trust Enforcement: Revolutionizing Security Through AI-Powered Identity Behavior Analytics

    Bharatveeranjaneya Reddy Devagiri
    2025-05-30
  • Optimizing Customer Segmentation in the Banking Sector: A Comparative Analysis of Machine Learning Algorithms

    Md Abu Sufian Mozumder, Fuad Mahmud, Md Shujan Shak, Nasrin Sultana, Gourab Nicholas Rodrigues, Md Al Rafi, Md Zahidur Rahman Farazi, Md Razaul Karim, Md. Sayham Khan, Md Shahriar Mahmud Bhuiyan
    2024-08-30
  • AI-Powered Access Governance: Automating Risk-Based Identity in Enterprise Cloud

    Vivek Aby Pothen
    2025-05-05
  • Human-Machine Collaboration in Semiconductor Processes

    Shruthi Ashok
    2025-06-04
  • EEG Functional Connectivity and Deep Learning for Automated Diagnosis of Alzheimer's disease and Schizophrenia

    Mohammad Hasan Sarwer, Tui Rani Saha, Shake Ibna Abir, Shaharina Shoha, Md Miraj Hossain, Nigar Sultana, Shariar Islam Saimon, Intiser Islam, Mahmud Hasan, Sarder Abdulla Al Shiam
    2025-01-26
  • Strengthening Digital Security: Dynamic Attack Detection with LSTM, KNN, and Random Forest

    Ansarullah Hasas, Mohammad Shuaib Zarinkhail, Musawer Hakimi, Mohammad Mustafa Quchi
    2024-01-03
  • Cloud Migration Strategies for Utility Companies: Addressing Unique Infrastructure and Regulatory Challenges

    Naveen Karuturi
    2025-05-01
  • Time Synchronization: The Heartbeat of Modern Smart Grid Networks

    Vinaya Surya
    2025-05-22
  • Data Integration and Security: The Technological Backbone of Modern FinTech

    Shanmukha Sai Nadh Avvari
    2025-05-03
  • Machine Learning and Deep Learning Techniques for EEG-Based Prediction of Psychiatric Disorders

    Shake Ibna Abir, Shaharina Shoha, Md Miraj Hossain, Nigar Sultana, Tui Rani Saha, Mohammad Hasan Sarwer, Shariar Islam Saimon, Intiser Islam, Mahmud Hasan
    2025-01-23
  • Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense

    Sunil Sukumaran Nair
    2024-01-14
  • A Comprehensive Analysis of Security Frameworks in Modern Cross-Border Payment Systems

    Nagaraju Unnava
    2025-05-15
  • Unsecured Remote Desktop Protocol (RDP) Access: A Gateway for Ransomware Attacks and Corporate Extortion

    Surendra Vitla
    2024-05-23
1 - 51 of 51 items

rightbar

Journal highlights
 
ISSN 2709-104X
DOI Prefix 10.32996/jcsts
Started 2021
Frequency Continuous
Language Multiple
APC $150

submission

Submit your article

menus

Find out more

Aims & scope
Call for Papers
Article Processing Charges
Publications Ethics
Google Scholar Citations
Recruitment

About Al-Kindi

Blog

Careers

Contact us

Further Information

Our awards

Our partners

Propose a special issue

EXPLORE

All journals

Publication ethics

Article processing charges

Keep up to date

  • Al Kindi Facebook
  • Al Kindi Twitter
  • Al Kindi LinkedIn
  • Al Kindi WhatsApp
  • Al Kindi Instagram

Copyright © 2024 Al-Kindi Center for Research and Development
3 Dryden Avenue, W7 1ES, Hanwell, London, UK | Registered in England & Wales No. 13110099