Vol. 5 No. 01 (2025): Volume 05 Issue 01
INNOVATIVE TECHNIQUES AND TOOLS FOR FORENSIC EXAMINATION OF E-MAIL
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
1-5
.
Articles
IMPROVING SECURITY AND OPERATIONAL EFFICIENCY: FACIAL RECOGNITION-BASED ACCESS CONTROL AT AL-IMAN WORKSHOP
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
6-12
.
https://doi.org/10.55640/ijns-05-01-01
Articles
Cybersecurity for Industry 4.0: Safeguarding Manufacturing Systems for the Future
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
13-21
.
https://doi.org/10.55640/ijns-05-01-02
Articles
Implementing Zero Trust Architecture: Modern Approaches to Secure Enterprise Networks
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
22-45
.
https://doi.org/10.55640/
Articles
Enhancing Data Security in ERP-Based Human Capital Management (HCM) Systems: A Study through Workday Security Framework
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
46-56
.
https://doi.org/10.55640/ijns-05-01-04
Articles
Predicting Congestion in High-Speed Low-Latency Networks with Rough Set Theory
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
57-61
.
https://doi.org/10.55640/
Articles
Building Compliance-Driven AI Systems: Navigating IEC 62304 and PCI-DSS Constraints
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
62-90
.
https://doi.org/10.55640/ijns-05-01-06
Articles
NLP-Based Automation in Customer Support and Case Management
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
91-117
.
https://doi.org/10.55640/ijns-05-01-07
Articles
Best Practices in Implementing Azure Entra Conditional Access for Multi-Tenant Environments
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
118-146
.
https://doi.org/10.55640/ijns-05-01-08
Articles
AI-Assisted Legacy Modernization: Automating Monolith-to-Microservice Decomposition
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
147-173
.
https://doi.org/10.55640/ijns-05-01-09
Articles
Infrastructure as Code (IaC) Best Practices for Multi-Cloud Deployments in Enterprises
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
174-186
.
https://doi.org/10.55640/ijns-05-01-10
Articles
21 CFR Part 11 Compliance in MES: Electronic Signatures and Data Integrity
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
187-201
.
https://doi.org/10.55640/ijns-05-01-11
Articles
Zero-Trust Architecture in Java Microservices
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
202-214
.
https://doi.org/10.55640/ijns-05-01-12
Articles
AI-Driven Performance Tuning of Jenkins Pipelines in Scalable DevOps Environments
International journal of networks and security,
Vol. 5 No. 01 (2025): Volume 05 Issue 01,
215-220
.
https://doi.org/10.55640/ijns-05-01-13
Articles
International journal of networks and security