Themes by Openjournaltheme.com Novelty OJS 3 Theme by openjournaltheme.com theme
Quick jump to page content
  • Main Navigation
  • Main Content
  • Sidebar
  • Register
  • Login
Online ISSN : 2617-6548

  • Home
  • Current
  • Archives
  • Announcements
  • About
    • About the Journal
    • Submissions
    • Contact Us
  • Policies
    • Peer Review Policy
    • AI Policy

Search

Advanced filters

Search Results

OTP security in wallet systems: A vulnerability assessment

Ahmad H. Al-Omari, Ahmad Ghazi Alshanty, Ayoub Alsarhan, Saifullah A. Omari
2356-2371
Abstract View : 892
Download :289
10.53894/ijirss.v8i2.5691

The impact of food security concept, supply and demand management, domestic agriculture, and agricultural technology on Malaysia's food security: A Delphi expert consensus approach

Sudhakar Madhavedi, Anjana Nagandran, Wong Chee Hoo, Anugu Anil Reddy, Pradeep Paraman
710-726
Abstract View : 515
Download :259
10.53894/ijirss.v8i3.6606
Social Sciences

The Participation of Rural Afghan Women in Small-Scale Dairy Farming

Miraqa Hussain Khail, Khal Mohammad Ahmadzai
59-66
Abstract View : 1456
Download :1651
10.53894/ijirss.v5i2.379
Social Sciences

Contribution of aquaculture to future food security: Economic analysis and development in Indonesia

Zainul Wasik, Sri Gunawan, Tanti Handriana
1036-1048
Abstract View : 462
Download :434
10.53894/ijirss.v8i1.4505
Social Sciences

Institutional economics of tourism safety and security: Insights from tourists and industry operators

Santhosh Kumar Shavanthappa, Navya Gubbi Sateeshchandra, Arun Kumar DC, Anastasios Fountis,...
2187-2199
Abstract View : 834
Download :340
10.53894/ijirss.v8i2.5646
Engineering

Static Analysis and Machine Learning-based Malware Detection System using PE Header Feature Values

Chang Keun Yuk, Chang Jin Seo
281-288
Abstract View : 1947
Download :1303
10.53894/ijirss.v5i4.690
Social Sciences

Psychological security and its relationship to academic ambition among students at prince Sattam Bin Abdulaziz University

Asma Hezam Ghormallah Al Zahrani
1338-1349
Abstract View : 138
Download :75
10.53894/ijirss.v8i5.9133
Social Sciences

The moderating role of gender in young individuals’ usage of E-wallets

Kyra Law Ley Sy, Si Chong En, Kelly Tee Pei Leng
3362-3373
Abstract View : 156
Download :101
10.53894/ijirss.v8i6.10356
Engineering

Hyperchaotic map-based adaptive polar codes for robust and efficient communication

Hadjer SOUILLAH, Lahcen HADJ ABDERRAHMANE, Abderrahmene HADJ BRAHIM , Adda ALI PACHA,...
245-255
Abstract View : 425
Download :243
10.53894/ijirss.v8i5.8604
Social Sciences

Hybrid DFA-Chaos Cryptosystem for Secure IoT Data Transmission on Resource-Constrained Devices

Akbota Kulzhanova, Sholpan Jomartova, Vadim Zhmud, Talgat Mazakov, Aigerim Mazakova
2048-2054
Abstract View : 236
Download :83
10.53894/ijirss.v8i6.10076
Social Sciences

Assessing the security implications of the ECOWAS protocol on free movement in Nigeria

Ochoga Edwin Ochoga, Goddy Uwa Osimen, Ibiso Esther Pokubo
621-629
Abstract View : 779
Download :338
10.53894/ijirss.v8i2.5254
Social Sciences

AI on the frontlines: Transforming border security in the fight against drug and arms smuggling

Mansoor G. Al-Thani
1928-1945
Abstract View : 337
Download :390
10.53894/ijirss.v8i4.8277
Social Sciences

Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role

Tin Tin Ting, Kar Man Cheah, Jie Xin Khiew, Yung Chin Lee, Jun Kit Chaw, Chong Keat Teoh
127-137
Abstract View : 1671
Download :1109
10.53894/ijirss.v7i1.2544
Engineering

Enhancing IoT communication security in smart agriculture using artificial intelligence

Bo Pang, Evgeny Sergeevich Abramov
2777-2787
Abstract View : 289
Download :162
10.53894/ijirss.v8i4.8399
Social Sciences

Hybrid software-hardware image encryption techniques for network security using multiple chaotic maps

Fadwa Al Azzo, Aamer T. Suhail, Harith G. Ayoub, Zaid. A. Abdulrazzaq
2140-2150
Abstract View : 175
Download :80
10.53894/ijirss.v8i5.9436
Engineering

Examining the function of Merkle trees in enhancing security within big data technologies

Akku Kubigenova, Almbubi Aktayeva, Altynbek Sharipbay, Rozamgul Niyazova, Aisha Sexenbayeva
2067-2082
Abstract View : 456
Download :377
10.53894/ijirss.v8i1.4899

Analyzing the impact of climate change on rice production and strategies for enhancing efficiency, sustainability, and global food security

Saeed Mohammed Algarni, Mohamed Ezzat Elshekh, Ahmed Mohammed Abou Agiza, Farid Saber Nassar
2946-2957
Abstract View : 7617
Download :1077
10.53894/ijirss.v8i2.5888
Social Sciences

Optimized security-aware VM placement for enhanced intrusion tolerance and resilience in IaaS clouds using MILP

Mahmoud Aljawarneh, Qais Al-Na’amneh, Rahaf Hazaymih, Ayoub Alsarhan, Khalid Hamad...
218-234
Abstract View : 465
Download :268
10.53894/ijirss.v8i5.8601
Social Sciences

The impact of land conversion on rice production vulnerability in south Bangka regency: A GIS-based analysis

Ivan Chofyan, Deshinta A. Dewi
1986-1997
Abstract View : 261
Download :151
10.53894/ijirss.v8i4.8282
Social Sciences

Data security in digital accounting: A logistic regression analysis of risk factors

Anber Abraheem Shlash Mohammad, Suleiman Ibrahim Shelash Mohammad, Badrea Al Oraini, Asokan...
2699-2709
Abstract View : 622
Download :408
10.53894/ijirss.v8i1.5044
Engineering

KTCGM: Towards A novel solution for enhancing Kerberos-5 with threshold cryptography and ML-based anomaly detection

Rami Almatarneh, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Nayef H. Alshammari
3646-3662
Abstract View : 397
Download :230
10.53894/ijirss.v8i3.7328

Analysis of the dynamics of cyberattacks and fraud methods using machine learning algorithms for IIoT: Information security of digital twins in Industry 4.0

Saltanat Adilzhanova, Murat Kunelbayev, Gulshat Amirkanova, Gulnur Tyulepberdinova, Sybanova...
4012-4026
Abstract View : 726
Download :245
10.53894/ijirss.v8i2.6201
Social Sciences

Digital ledger technology: A factor analysis of financial data management practices in the age of blockchain in Jordan

Anber Abraheem Shlash Mohammad, Suleiman Ibrahim Shelash Mohammad, Khaleel Ibrahim Al-Daoud,...
2567-2577
Abstract View : 471
Download :261
10.53894/ijirss.v8i2.5737
Medical Sciences and Healthcare

The Indonesian National Health Security’s deficits: Excises and the handling of non-communicable diseases

Arief Budiono, Nunik Nurhayati, Rizka, Said Saidakhrarovich Gulyamov, Ayesha Hendiana...
375-384
Abstract View : 474
Download :278
10.53894/ijirss.v8i2.5167
Social Sciences

Addressing security challenges: Strategic approaches of Arab gulf states

Mohammed Torki Bani Salameh, Rasha Adnan Mubiadeen
1853-1864
Abstract View : 502
Download :265
10.53894/ijirss.v8i1.4807
1 - 25 of 147 items 1 2 3 4 5 6 > >> 

MakeSubmission

SocialShare

  Twitter share
  FB share

SidebarMenu

Journal Menu

 Focus & scopes

 Author guidelines

 Publication ethics

 Editorial team

 Indexing

  APC

Published Volume By Year
2025
Volume 8 : Issue 12
Volume 8 : Issue 11
Volume 8 : Issue 10
Volume 8 : Issue 9
Volume 8 : Issue 8
Volume 8 : Issue 7
Volume 8 : Issue 6
Volume 8 : Issue 5
Volume 8 : Issue 4
Volume 8 : Issue 3
Volume 8 : Issue 2
Volume 8 : Issue 1
2024
Volume 7 : Issue 4
Volume 7 : Issue 3
Volume 7 : Issue 2
Volume 7 : Issue 1
2023
Volume 6 : Issue 4
Volume 6 : Issue 3
Volume 6 : Issue 2
Volume 6 : Issue 1
2022
Volume 5 : Issue 4
Volume 5 : Issue 3
Volume 5 : Issue 2
Volume 5 : Issue 1
2021
Volume 4 : Issue 4
Volume 4 : Issue 3
Volume 4 : Issue 2
Volume 4 : Issue 1
2020
Volume 3 : Issue 4
Volume 3 : Issue 3
Volume 3 : Issue 2
Volume 3 : Issue 1
2019
Volume 2 : Issue 4
Volume 2 : Issue 3
Volume 2 : Issue 2
Volume 2 : Issue 1
2018
Volume 1 : Issue 4
Volume 1 : Issue 3
Volume 1 : Issue 2
Volume 1 : Issue 1
Themes by Openjournaltheme.com

LeftColumnStart

JournalIssue

Journal Issue

View Current Issue

Journal Ranking

Highly Accessed
  • Emulsion types, stability mechanisms and rheology: A review
    292
    September 21, 2018
    Sweeta Akbari, Abdurahman ...
  • Time management for leaders and impact on productivity: A review study
    122
    March 11, 2025
    Rajesh Ranjan, Rashmi Sin...
  • Cybersecurity awareness among school students: Exploring influencing factors, legal implications, and knowledge gaps
    116
    February 14, 2025
    Mostafa Hussam Mostafa Alt...
  • Language and gender: How societal norms influence communication and implications for language teaching
    99
    March 4, 2025
    Tran Thanh Du, Nguyen Le N...
  • The impact of using the balanced scorecard on improving the quality of accounting information in Saudi commercial banks: A field study
    98
    May 9, 2025
    Mohammed Atiah Alharbi, Ja...

Current Issue

  • Atom logo
  • RSS2 logo
  • RSS1 logo

Note

  1. Any communication from IJIRSS will come through official channels by email editor@ijirss.com and info@ijirss.com.
  2. IJIRSS  receives submissions through its online submission system.
logo apjed
Contact Us
Any communication from IJIRSS will come through official channels by email editor@ijirss.com and info@ijirss.com.
IJIRSS  receives submissions through its online submission system.
 
 
 
 
 
Copyright © 2021 IJIRSS - International Journal of Innovative Research and Scientific Studies, All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
Licensed under Creative Commons License a Creative Commons Attribution 4.0 International License.
Themes by Openjournaltheme.com

Cited by

AllSince 2020
Citations25592400
h-index2121
i10-index6767
0
1100
550
275
825
201520162017201820192020202120222023202420252018213042551042993525561013