Themes by Openjournaltheme.com
Novelty OJS 3 Theme by openjournaltheme.com theme
Quick jump to page content
Main Navigation
Main Content
Sidebar
Register
Login
Online ISSN : 2617-6548
Toggle navigation
Home
Current
Archives
Announcements
About
About the Journal
Submissions
Contact Us
Policies
Peer Review Policy
AI Policy
Search
Search
Search articles for
Advanced filters
Published After
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Search Results
OTP security in wallet systems: A vulnerability assessment
Ahmad H. Al-Omari, Ahmad Ghazi Alshanty, Ayoub Alsarhan, Saifullah A. Omari
2356-2371
Abstract View : 892
Download :289
10.53894/ijirss.v8i2.5691
The impact of food security concept, supply and demand management, domestic agriculture, and agricultural technology on Malaysia's food security: A Delphi expert consensus approach
Sudhakar Madhavedi, Anjana Nagandran, Wong Chee Hoo, Anugu Anil Reddy, Pradeep Paraman
710-726
Abstract View : 515
Download :259
10.53894/ijirss.v8i3.6606
Social Sciences
The Participation of Rural Afghan Women in Small-Scale Dairy Farming
Miraqa Hussain Khail, Khal Mohammad Ahmadzai
59-66
Abstract View : 1456
Download :1651
10.53894/ijirss.v5i2.379
Social Sciences
Contribution of aquaculture to future food security: Economic analysis and development in Indonesia
Zainul Wasik, Sri Gunawan, Tanti Handriana
1036-1048
Abstract View : 462
Download :434
10.53894/ijirss.v8i1.4505
Social Sciences
Institutional economics of tourism safety and security: Insights from tourists and industry operators
Santhosh Kumar Shavanthappa, Navya Gubbi Sateeshchandra, Arun Kumar DC, Anastasios Fountis,...
2187-2199
Abstract View : 834
Download :340
10.53894/ijirss.v8i2.5646
Engineering
Static Analysis and Machine Learning-based Malware Detection System using PE Header Feature Values
Chang Keun Yuk, Chang Jin Seo
281-288
Abstract View : 1947
Download :1303
10.53894/ijirss.v5i4.690
Social Sciences
Psychological security and its relationship to academic ambition among students at prince Sattam Bin Abdulaziz University
Asma Hezam Ghormallah Al Zahrani
1338-1349
Abstract View : 138
Download :75
10.53894/ijirss.v8i5.9133
Social Sciences
The moderating role of gender in young individuals’ usage of E-wallets
Kyra Law Ley Sy, Si Chong En, Kelly Tee Pei Leng
3362-3373
Abstract View : 156
Download :101
10.53894/ijirss.v8i6.10356
Engineering
Hyperchaotic map-based adaptive polar codes for robust and efficient communication
Hadjer SOUILLAH, Lahcen HADJ ABDERRAHMANE, Abderrahmene HADJ BRAHIM , Adda ALI PACHA,...
245-255
Abstract View : 425
Download :243
10.53894/ijirss.v8i5.8604
Social Sciences
Hybrid DFA-Chaos Cryptosystem for Secure IoT Data Transmission on Resource-Constrained Devices
Akbota Kulzhanova, Sholpan Jomartova, Vadim Zhmud, Talgat Mazakov, Aigerim Mazakova
2048-2054
Abstract View : 236
Download :83
10.53894/ijirss.v8i6.10076
Social Sciences
Assessing the security implications of the ECOWAS protocol on free movement in Nigeria
Ochoga Edwin Ochoga, Goddy Uwa Osimen, Ibiso Esther Pokubo
621-629
Abstract View : 779
Download :338
10.53894/ijirss.v8i2.5254
Social Sciences
AI on the frontlines: Transforming border security in the fight against drug and arms smuggling
Mansoor G. Al-Thani
1928-1945
Abstract View : 337
Download :390
10.53894/ijirss.v8i4.8277
Social Sciences
Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role
Tin Tin Ting, Kar Man Cheah, Jie Xin Khiew, Yung Chin Lee, Jun Kit Chaw, Chong Keat Teoh
127-137
Abstract View : 1671
Download :1109
10.53894/ijirss.v7i1.2544
Engineering
Enhancing IoT communication security in smart agriculture using artificial intelligence
Bo Pang, Evgeny Sergeevich Abramov
2777-2787
Abstract View : 289
Download :162
10.53894/ijirss.v8i4.8399
Social Sciences
Hybrid software-hardware image encryption techniques for network security using multiple chaotic maps
Fadwa Al Azzo, Aamer T. Suhail, Harith G. Ayoub, Zaid. A. Abdulrazzaq
2140-2150
Abstract View : 175
Download :80
10.53894/ijirss.v8i5.9436
Engineering
Examining the function of Merkle trees in enhancing security within big data technologies
Akku Kubigenova, Almbubi Aktayeva, Altynbek Sharipbay, Rozamgul Niyazova, Aisha Sexenbayeva
2067-2082
Abstract View : 456
Download :377
10.53894/ijirss.v8i1.4899
Analyzing the impact of climate change on rice production and strategies for enhancing efficiency, sustainability, and global food security
Saeed Mohammed Algarni, Mohamed Ezzat Elshekh, Ahmed Mohammed Abou Agiza, Farid Saber Nassar
2946-2957
Abstract View : 7617
Download :1077
10.53894/ijirss.v8i2.5888
Social Sciences
Optimized security-aware VM placement for enhanced intrusion tolerance and resilience in IaaS clouds using MILP
Mahmoud Aljawarneh, Qais Al-Na’amneh, Rahaf Hazaymih, Ayoub Alsarhan, Khalid Hamad...
218-234
Abstract View : 465
Download :268
10.53894/ijirss.v8i5.8601
Social Sciences
The impact of land conversion on rice production vulnerability in south Bangka regency: A GIS-based analysis
Ivan Chofyan, Deshinta A. Dewi
1986-1997
Abstract View : 261
Download :151
10.53894/ijirss.v8i4.8282
Social Sciences
Data security in digital accounting: A logistic regression analysis of risk factors
Anber Abraheem Shlash Mohammad, Suleiman Ibrahim Shelash Mohammad, Badrea Al Oraini, Asokan...
2699-2709
Abstract View : 622
Download :408
10.53894/ijirss.v8i1.5044
Engineering
KTCGM: Towards A novel solution for enhancing Kerberos-5 with threshold cryptography and ML-based anomaly detection
Rami Almatarneh, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Nayef H. Alshammari
3646-3662
Abstract View : 397
Download :230
10.53894/ijirss.v8i3.7328
Analysis of the dynamics of cyberattacks and fraud methods using machine learning algorithms for IIoT: Information security of digital twins in Industry 4.0
Saltanat Adilzhanova, Murat Kunelbayev, Gulshat Amirkanova, Gulnur Tyulepberdinova, Sybanova...
4012-4026
Abstract View : 726
Download :245
10.53894/ijirss.v8i2.6201
Social Sciences
Digital ledger technology: A factor analysis of financial data management practices in the age of blockchain in Jordan
Anber Abraheem Shlash Mohammad, Suleiman Ibrahim Shelash Mohammad, Khaleel Ibrahim Al-Daoud,...
2567-2577
Abstract View : 471
Download :261
10.53894/ijirss.v8i2.5737
Medical Sciences and Healthcare
The Indonesian National Health Security’s deficits: Excises and the handling of non-communicable diseases
Arief Budiono, Nunik Nurhayati, Rizka, Said Saidakhrarovich Gulyamov, Ayesha Hendiana...
375-384
Abstract View : 474
Download :278
10.53894/ijirss.v8i2.5167
Social Sciences
Addressing security challenges: Strategic approaches of Arab gulf states
Mohammed Torki Bani Salameh, Rasha Adnan Mubiadeen
1853-1864
Abstract View : 502
Download :265
10.53894/ijirss.v8i1.4807
1 - 25 of 147 items
1
2
3
4
5
6
>
>>
Themes by Openjournaltheme.com
Cited by
View all
All
Since 2020
Citations
2559
2400
h-index
21
21
i10-index
67
67
0
1100
550
275
825
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
20
18
21
30
42
55
104
299
352
556
1013