Skip to main content Skip to main navigation menu Skip to site footer
Publisher
  • About Al-Kindi
  • Our services
  • All journals
  • Our Partners
  • Publish with us
  • Register
  • Login

Journal of Computer Science and Technology Studies

Journal of Computer Science and Technology Studies
  • Journal Overview
    • About journal
    • Author's Guidelines
    • Article Processing Charges
    • Peer Review Process
    • Publication Ethics
    • Policies
    • Why Publish with us?
  • Editorial Team
  • Indexing
  • Latest issue
  • All issues
  • Announcements
  • Contact us
  1. Home /
  2. Search

Search

Related contents

About Journal
Latest issue
All issues
Submit your paper
Contact the journal
Advanced filters
Published After
Published Before

Search Results

  • Security as Code: An Architectural Framework for Automated Risk Mitigation in DevSecOps Pipelines

    Naresh Kiran Kumar Reddy Yelkoti
    2025-06-12
  • The Role of AI-Enhanced Personalization in Customer Experiences

    Mohammad Shafiquzzaman Bhuiyan
    2024-02-01
  • Securing Generative AI: Navigating Data Security Challenges in the AI Era

    Yogesh Kumar Bhardwaj
    2025-05-10
  • The Role of Databases in Cybersecurity and Threat Detection: Advancements through Spanner Graph Technology

    Pushap Goyal
    2025-06-03
  • Securing Multi-Cloud Environments: Challenges and Solutions

    Srikanth Potla
    2025-05-21
  • Security Implications of Fully Autonomous Process Agents in Enterprise Workflows

    Ravindra Reddy Madireddy
    2025-05-01
  • Zero Trust Security for AI-Driven Payment Systems in Multi-Cloud Environments

    Soma Kiran Kumar Nellipudi
    2025-06-04
  • Ethical Hacking and Penetration Testing – How Organizations Use Ethical Hackers to Strengthen Security

    Supom Roy, Ornab Banik
    2025-05-27
  • Cloud-Enabled Financial Services: Building Secure and Compliant Solutions with AWS and Spring Security

    Vijaya Kumar Katta
    2025-05-19
  • Multi-Layer Security Architecture for Cloud-Connected Autonomous Systems

    Mathew Sebastian
    2025-05-08
  • The Evolution and Societal Impact of Security Engineering in the Digital Age

    Imran Ahmed Shaik
    2025-06-07
  • Case Study Analysis: AI Algorithms for Enhanced Network Security Defense

    Anil Kumar Gottepu
    2025-06-12
  • Securing the Enterprise: A Case Study in Data Access Control

    Kiran Kumar Reddy Pamuru
    2025-06-09
  • Navigating AI Security Challenges Across Industries: Best Practices for Secure Adoption of Generative and Agentic AI Systems

    Balusamy Chinnappaiyan
    2025-06-12
  • Demystifying Zero Trust Security: The No-Trust Network Paradigm

    Vaibhav Anil Vora
    2025-05-01
  • A Comprehensive Analysis of Security Frameworks in Modern Cross-Border Payment Systems

    Nagaraju Unnava
    2025-05-15
  • Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation

    Narendra Chennupati
    2025-05-07
  • Unsecured Remote Desktop Protocol (RDP) Access: A Gateway for Ransomware Attacks and Corporate Extortion

    Surendra Vitla
    2024-05-23
  • Adaptive Authentication in Healthcare: Balancing Security with Accessibility

    Gowtham Kukkadapu
    2025-06-16
  • AI-Driven Risk Assessment in National Security Projects: Investigating machine learning models to predict and mitigate risks in defense and critical infrastructure projects

    Md Habibul Arif, Habibor Rahman Rabby, Nusrat Yasmin Nadia, Md Iftekhar Monzur Tanvir, Abdullah Al Masum
    2025-04-05
  • Strengthening Digital Security: Dynamic Attack Detection with LSTM, KNN, and Random Forest

    Ansarullah Hasas, Mohammad Shuaib Zarinkhail, Musawer Hakimi, Mohammad Mustafa Quchi
    2024-01-03
  • The Imperative of Zero Trust Architecture in Modern Product Security

    Sachin Kapoor
    2025-06-30
  • The Architecture of Trust: Deep Diving into Cloud Security Infrastructure

    Aravind Guduru
    2025-05-05
  • Human-AI Collaboration in Identity Security: When Should AI Decide?

    Sujatha Lakshmi Narra
    2025-07-02
  • Addressing the Challenges of Data Security and Privacy in Cloud-Based Financial Systems

    Nagesh Shenisetty
    2025-05-30
  • Automating Multi-Account Governance in AWS: A Scalable Approach to Enterprise Cloud Management

    Sreeja Reddy Challa
    2025-07-06
  • AI-Driven Project Risk Management: Leveraging Artificial Intelligence to Predict, Mitigate, and Manage Project Risks in Critical Infrastructure and National Security Projects

    Md Imtiaz Faruk, Fatin Wahab Plabon, Udoy Sankar Saha, Mohammad Didar Hossain
    2025-06-12
  • Mastering Data Privacy and Security in CRM with AI: A Technical Perspective

    Venkata Sunil Kumar Majeti
    2025-06-10
  • Policy Enforcement and Compliance in SASE: A Legal and Technical Review

    Venkatasubramani Arumugam
    2025-06-26
  • Balancing Data Security and Accessibility in Modern Data Engineering: A Framework for Enterprise Implementation

    Nihitha Sallapalli
    2025-06-13
  • Proactive Security with AI: Revolutionizing Cloud Infrastructure Protection

    Krupal Gangapatnam
    2025-05-03
  • Exploring the Synergy of Cloud and On-Premises Systems- A Case for Hybrid Architectures

    Ashwin Chavan
    2023-09-20
  • Secure-by-Design CI/CD Pipelines: A Zero Trust Framework for Cloud-Native Deployment Automation

    Rahul Chowdary Bondalapati, Lakshmi Apoorwa Kumpatla, Suvarna Rekha Karumanchi
    2025-05-30
  • Financial Services Cloud Transformation: Securing Sensitive Data in Kafka Event Streams

    Janakiram Meka
    2025-05-26
  • Securing the Digital Core: Cybersecurity Challenges and Strategies in SAP ERP Systems

    Krupal Gangapatnam
    2025-05-03
  • Technical Review: Implementing RBAC for Azure Cosmos DB Integrated Cache

    Karthik Chakravarthy Cheekuri
    2025-06-02
  • Data Classification Methodologies and Implementation

    Sheela Kakanur Shivayogi
    2025-05-30
  • Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights

    Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, Sanjida Akter Sarna
    2025-05-12
  • Biometric Authentication-Risks and advancements in biometric security systems

    Gaurav Malik
    2024-08-25
  • Autonomous Zero Trust Enforcement: Revolutionizing Security Through AI-Powered Identity Behavior Analytics

    Bharatveeranjaneya Reddy Devagiri
    2025-05-30
  • Optimizing Multi-Cloud Business Intelligence: A Framework for Balancing Cost, Performance, and Security

    Muruganantham Angamuthu
    2025-05-15
  • Securing Retrieval-Augmented Generation Pipelines: A Comprehensive Framework

    Siddharth Nandagopal
    2025-01-12
  • Security Analysis of Android Applications a Case Study of Applications in Palestine

    Deema Sawalha, Saleh Salous, Mahmoud Sawalha
    2025-06-11
  • Identity and Access Management Transformation in Large Enterprises: A Case Study Analysis

    Vasu Sunil Kumar Grandhi
    2025-06-01
  • Secure Communication Protocol for Distributed Environments

    Sravanthi Akavaram
    2025-05-22
  • AI-Driven Incident Response for Digital Forensics and Incident Response: A Comprehensive Framework

    Santosh Datta Bompally
    2025-04-25
  • The Future of Identity and Access Management: Leveraging AI for Enhanced Security and Efficiency

    Surendra Vitla
    2024-08-25
  • Data Trust in Cloud-Based AI Systems: A Comprehensive Analysis

    Arun Kumar Palathumpattu Thankappan
    2025-04-23
  • Digital Trust and Workforce Transformation: Microsoft Cloud's Role in Democratizing Technology Access and Ethical Governance

    Arjun Kumar Paruchuri
    2025-06-13
  • Unified Identity Management in the Cloud: SAP IAS Integration with SAP BTP

    Srinivas Kolluri
    2025-06-04
  • Safeguarding OT Networks in Biotech Manufacturing Plants

    Prasanth Kosaraju
    2025-05-23
  • Demystifying the MITRE ATT&CK Framework: A Practical Guide to Threat Modeling

    Vilas Shewale
    2025-05-02
  • Zero Trust Architecture: Enhancing Cybersecurity in Enterprise Networks

    Tahir Bashir
    2024-09-23
  • Secure and Safety-Aware IST Architectures for Next-Gen Automotive Systems

    Jayesh Kumar Pandey
    2025-06-23
  • Data Integration and Security: The Technological Backbone of Modern FinTech

    Shanmukha Sai Nadh Avvari
    2025-05-03
  • The Evolution of Cloud Architecture: Navigating Security and Sustainability in the Hybrid Era

    NAVEEN REDDY THATIGUTLA
    2025-05-29
  • Cloud Automation in Finance: Enhancing Security and Performance

    Praveen Kumar Thota
    2025-05-07
  • Cloud Security in Financial Services: Implementing Scalable and Compliant Multi-Cloud Architectures

    Arunkumarreddy Yalate
    2025-05-14
  • Unified Identity Management: Implementing Secure Federation Across Multi-Cloud ERP Systems

    Ravi Teja Balla
    2025-06-12
  • Securing the Modern Healthcare Ecosystem: Endpoint Management for Medical Environments

    Sri Harsha Koneru
    2025-05-10
  • Revolutionizing Financial Infrastructure: The Convergence of Blockchain and Cloud in Next-Generation Payment Networks

    Sai Krishna Gurram
    2025-05-17
  • Converged IAM: Transforming Enterprise Identity Management in the Cloud Era

    Anjan Kumar Kaleru
    2025-04-28
  • Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda

    Washington Okori, Sarah Buteraba
    2024-10-05
  • Linux vs. Windows: A Comparison of Two Widely Used Platforms

    Muhammad Talha Awan , Kashaf Khan
    2022-01-21
  • Evaluating the Effectiveness of AI-Driven Threat Intelligence Systems: A Technical Analysis

    RAJESH RAJAMOHANAN NAIR
    2025-05-07
  • Safety-Critical Synchronization in Distributed Embedded System Clusters: A Comprehensive Analysis

    Kayalvizhi Rajagopal
    2025-06-12
  • Redefining Business Intelligence Infrastructure: Core Skills for the AI-Driven Era

    Sujith Gudipudi
    2025-06-18
  • Cloud vs. On-Premise Data Warehousing: A Strategic Analysis for Financial Institutions

    Preeta Pillai
    2025-05-07
  • Intent-Based Networking Architecture: A Deep Dive into Its Components and Workflow

    Pankaj Kumar Gupta
    2025-05-17
  • AI-Based Intrusion Detection & Prevention Models for Smart Home IoT Systems: A Literature Review

    Jayveersinh Vansiya, Asha Chandi, Rashid A Khan
    2025-05-24
  • Detecting IoT Cyberattacks: Advanced Machine Learning Models for Enhanced Security in Network Traffic

    Md Rashed Buiya, A K M Nuruzzaman Laskar, Md Rafiqul Islam, Sanjib Kumar Shil, Muhammad Shoyaibur Rahman Chowdhury, Reza E Rabbi Shawon, Md Sumsuzoha
    2024-10-18
  • Neuro-Symbolic AI for IoT-Driven Smart Cities: A Next-Generation Framework for Urban Intelligence

    Shamima Akhter, Joynul Arefin, Md Shahadat Hossen, Dr. Muhibul Haque Bhuyan, Shaiyek Md. Buland Taslim, Dr. Md. Saniat Rahman Zishan, Dr. Mohammad Amanul Islam
    2025-04-04
  • Infrastructure as Code for Cloud-Native Data Platforms: Automation and Best Practices

    Srikanth Dandolu
    2025-06-03
  • Network Infrastructure: The Critical Foundation of Modern Financial Systems

    Bhaskararao Vakamullu
    2025-06-09
  • The Role of Blockchain in Banking Fraud Detection: Enhancing Security and Transparency

    Md Sumon Parvez, Mushfiqur Rashid Khan
    2025-04-24
  • Collaborative Cyber Defense: A Framework for Purple Team Integration in Countering Sophisticated Adversaries

    Bhanu Prakash Reddy Mettu
    2025-06-10
  • Securing Voice-Based Financial Authentication in the Era of AI Voice Cloning: Challenges, Vulnerabilities, and Counter-Measures

    Sai Manoj Jayakannan
    2025-05-17
  • Transforming Healthcare Through AI-Driven Application Modernization and Hybrid Cloud Architecture

    Rajeev Samuel Devadas
    2025-06-17
  • Cloud-Native DevOps for SWIFT Deployments on Azure - Redefining Operational Agility in Financial Messaging

    Dileep Kumar Kanimetta
    2025-06-25
  • Lessons Learned: Fine-Tuning a Generative AI Model for Internal Knowledge Management - Pitfalls and Successes

    Aditya Krishna Sonthy
    2025-05-29
  • AI-Based Rate Limiting for Cloud Infrastructure: Implementation Guide

    Rehana Sultana Khan
    2025-05-03
  • Real-Time Clinical Data Governance Architecture: Financial Compliance-Inspired Model for HIPAA/HITECH Compliance

    Naga Krishna Mahesh Pulikonda
    2025-05-19
  • Data Protection as a Public Good: Leveraging AI/ML for Scalable Digital Resilience

    Sravan Kumar Sadhu
    2025-06-30
  • AI-Powered Data Governance: Advancing Privacy and Compliance Through Data Masking and Sentiment Analysis

    Bujjibabu Katta
    2025-05-23
  • Cloud-Native Enterprise Integration: Architectures, Challenges, and Best Practices

    Ramadevi Sannapureddy
    2025-05-30
  • AI-Driven Resilience in Cloud-Native Big Data Platforms Against Cyberattacks

    Jyoti Kunal Shah
    2022-12-25
  • Demystifying Medical Directories: How AI and Cloud Technologies Enable Efficient Storage of Patient Medical Conditions and Prescriber Information

    Soham Chakraborti
    2025-06-11
  • CHEZ PL: A Scalable Zero-Trust CIAM-PAM Architecture for Large Enterprises

    Sai Vaishnavi Anantula
    2025-06-01
  • Safer and More Efficient Parallel Cryptographic Algorithm and its Implementation in the GPU

    Artan Berisha
    2021-06-11
  • The Convergence of FHIR and AI: Revolutionizing Healthcare Data Interoperability

    Sai Sharan Reddy Mittapelly
    2025-06-07
  • Cyber Security and Approaches of Institutions: A study on private institutions of Banani and Dhanmondi Thana area, Dhaka

    Shaira Matin, Md. Monwarul Islam
    2019-12-22
  • Enterprise-Grade Mobile Test Automation: A Framework for Cross-Platform Financial and Cloud Applications

    Charanpreet Singh Hora
    2025-05-14
  • Multi-Cloud and Hybrid Cloud Strategies for Enterprise API Architectures

    Vamsi Krishna Reddy Munnangi
    2025-05-10
  • Unified One-Click Disaster Recovery Platform with Secure Isolation and Real-Time Failover of Data Centers, Remote Sites, and Office Edge Sites

    Vamshidhar Reddy
    2025-06-26
  • Decentralized Identity Using Blockchain: Enhancing Security and Privacy in Digital Identity Management

    Bhaskardeep Khaund
    2025-06-19
  • Advanced Cyber Threats and Cybersecurity Innovation - Strategic Approaches and Emerging Solutions

    Jobanpreet Kaur, Syed Nazmul Hasan, Shuchona Malek Orthi, Md Alamgir Miah, Mohammad Abdul Goffer, Clinton Ronjon Barikdar, Jahid Hassan
    2023-07-20
  • Building a Career in FinTech Cloud and Platform Engineering

    Satish Manchana
    2025-06-10
  • Demystifying Identity and Access Management: A Primer for Modern Enterprise Security

    Karanveer Singh Gondara
    2025-06-13
  • Enhancing Patient-Centric Care through API-Driven Integrations

    Gunjan Desai Rajendrakumar
    2025-06-04
  • Building a Robust CI/CD Pipeline for AI-Powered Cloud Applications

    Sudheer Obbu
    2025-05-03
1 - 100 of 238 items 1 2 3 > >> 

rightbar

Journal highlights
 
ISSN 2709-104X
DOI Prefix 10.32996/jcsts
Started 2021
Frequency Continuous
Language Multiple
APC $150
Impact Factor 5.828

submission

Submit your article

menus

Find out more

Aims & scope
Call for Papers
Article Processing Charges
Publications Ethics
Google Scholar Citations
Recruitment

About Al-Kindi

Blog

Careers

Contact us

Further Information

Our awards

Our partners

Propose a special issue

EXPLORE

All journals

Publication ethics

Article processing charges

Keep up to date

  • Al Kindi Facebook
  • Al Kindi Twitter
  • Al Kindi LinkedIn
  • Al Kindi WhatsApp
  • Al Kindi Instagram

Copyright © 2024 Al-Kindi Center for Research and Development
3 Dryden Avenue, W7 1ES, Hanwell, London, UK | Registered in England & Wales No. 13110099