
Keywords
INNOVATIVE TECHNIQUES AND TOOLS FOR FORENSIC EXAMINATION OF E-MAIL
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
1-5
.
Articles
IMPROVING SECURITY AND OPERATIONAL EFFICIENCY: FACIAL RECOGNITION-BASED ACCESS CONTROL AT AL-IMAN WORKSHOP
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
6-12
.
https://doi.org/10.55640/ijns-05-01-01
Articles
Cybersecurity for Industry 4.0: Safeguarding Manufacturing Systems for the Future
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
13-21
.
https://doi.org/10.55640/ijns-05-01-02
Articles
Implementing Zero Trust Architecture: Modern Approaches to Secure Enterprise Networks
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
22-45
.
https://doi.org/10.55640/
Articles
Enhancing Data Security in ERP-Based Human Capital Management (HCM) Systems: A Study through Workday Security Framework
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
46-56
.
https://doi.org/10.55640/ijns-05-01-04
Articles
Predicting Congestion in High-Speed Low-Latency Networks with Rough Set Theory
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
57-61
.
https://doi.org/10.55640/
Articles
Building Compliance-Driven AI Systems: Navigating IEC 62304 and PCI-DSS Constraints
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
62-90
.
https://doi.org/10.55640/ijns-05-01-06
Articles
NLP-Based Automation in Customer Support and Case Management
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
91-117
.
https://doi.org/10.55640/ijns-05-01-07
Articles
Best Practices in Implementing Azure Entra Conditional Access for Multi-Tenant Environments
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
118-146
.
https://doi.org/10.55640/ijns-05-01-08
Articles
AI-Assisted Legacy Modernization: Automating Monolith-to-Microservice Decomposition
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
147-173
.
https://doi.org/10.55640/ijns-05-01-09
Articles
Infrastructure as Code (IaC) Best Practices for Multi-Cloud Deployments in Enterprises
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
174-186
.
https://doi.org/10.55640/ijns-05-01-10
Articles
International journal of networks and security
International Journal of Networks and Security (2693-387X)
Last Submission:- 10th of Every December
Frequency: 1 Issue per Year (Yearly)