Skip to main content Skip to main navigation menu Skip to site footer
Publisher
  • About Al-Kindi
  • Our services
  • All journals
  • Our Partners
  • Publish with us
  • Register
  • Login

Journal of Computer Science and Technology Studies

Journal of Computer Science and Technology Studies
  • Journal Overview
    • About journal
    • Author's Guidelines
    • Article Processing Charges
    • Peer Review Process
    • Publication Ethics
    • Policies
    • Why Publish with us?
  • Editorial Team
  • Indexing
  • Latest issue
  • All issues
  • Announcements
  • Contact us
  1. Home /
  2. Search

Search

Related contents

About Journal
Latest issue
All issues
Submit your paper
Contact the journal
Advanced filters
Published After
Published Before

Search Results

  • Security as Code: An Architectural Framework for Automated Risk Mitigation in DevSecOps Pipelines

    Naresh Kiran Kumar Reddy Yelkoti
    2025-06-12
  • Securing Generative AI: Navigating Data Security Challenges in the AI Era

    Yogesh Kumar Bhardwaj
    2025-05-10
  • Security Implications of Fully Autonomous Process Agents in Enterprise Workflows

    Ravindra Reddy Madireddy
    2025-05-01
  • Ethical Hacking and Penetration Testing – How Organizations Use Ethical Hackers to Strengthen Security

    Supom Roy, Ornab Banik
    2025-05-27
  • Security Analysis of Android Applications a Case Study of Applications in Palestine

    Deema Sawalha, Saleh Salous, Mahmoud Sawalha
    2025-06-11
  • Navigating AI Security Challenges Across Industries: Best Practices for Secure Adoption of Generative and Agentic AI Systems

    Balusamy Chinnappaiyan
    2025-06-12
  • Securing the Enterprise: A Case Study in Data Access Control

    Kiran Kumar Reddy Pamuru
    2025-06-09
  • Securing the Automated Enterprise: A Framework for Mitigating Security and Privacy Risks in AI-Driven Workflow Automation

    Narendra Chennupati
    2025-05-07
  • Unsecured Remote Desktop Protocol (RDP) Access: A Gateway for Ransomware Attacks and Corporate Extortion

    Surendra Vitla
    2024-05-23
  • Securing Voice-Based Financial Authentication in the Era of AI Voice Cloning: Challenges, Vulnerabilities, and Counter-Measures

    Sai Manoj Jayakannan
    2025-05-17
  • AI-Driven Project Risk Management: Leveraging Artificial Intelligence to Predict, Mitigate, and Manage Project Risks in Critical Infrastructure and National Security Projects

    Md Imtiaz Faruk, Fatin Wahab Plabon, Udoy Sankar Saha, Mohammad Didar Hossain
    2025-06-12
  • Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda

    Washington Okori, Sarah Buteraba
    2024-10-05
  • Demystifying the MITRE ATT&CK Framework: A Practical Guide to Threat Modeling

    Vilas Shewale
    2025-05-02
  • Securing the Digital Core: Cybersecurity Challenges and Strategies in SAP ERP Systems

    Krupal Gangapatnam
    2025-05-03
  • Technical Review: Implementing RBAC for Azure Cosmos DB Integrated Cache

    Karthik Chakravarthy Cheekuri
    2025-06-02
  • Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights

    Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, Sanjida Akter Sarna
    2025-05-12
  • Neuro-Symbolic AI for IoT-Driven Smart Cities: A Next-Generation Framework for Urban Intelligence

    Shamima Akhter, Joynul Arefin, Md Shahadat Hossen, Dr. Muhibul Haque Bhuyan, Shaiyek Md. Buland Taslim, Dr. Md. Saniat Rahman Zishan, Dr. Mohammad Amanul Islam
    2025-04-04
  • Collaborative Cyber Defense: A Framework for Purple Team Integration in Countering Sophisticated Adversaries

    Bhanu Prakash Reddy Mettu
    2025-06-10
  • Revolutionizing Financial Infrastructure: The Convergence of Blockchain and Cloud in Next-Generation Payment Networks

    Sai Krishna Gurram
    2025-05-17
  • Converged IAM: Transforming Enterprise Identity Management in the Cloud Era

    Anjan Kumar Kaleru
    2025-04-28
  • Safety-Critical Synchronization in Distributed Embedded System Clusters: A Comprehensive Analysis

    Kayalvizhi Rajagopal
    2025-06-12
  • Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense

    Sunil Sukumaran Nair
    2024-01-14
  • Enterprise-Grade Mobile Test Automation: A Framework for Cross-Platform Financial and Cloud Applications

    Charanpreet Singh Hora
    2025-05-14
  • Cloud-Native Enterprise Integration: Architectures, Challenges, and Best Practices

    Ramadevi Sannapureddy
    2025-05-30
  • Fortifying the Future: Defending Machine Learning Systems from AI-Powered Cyberattacks

    Gresshma Atluri
    2025-05-10
  • Integrating Machine Learning and Real-Time Analytics for Risk Management in Cloud-Based Insurance Platforms

    Mahesh Kumar Venkata Sri Parimala Sai Pillutla
    2025-06-12
  • Revitalizing the Electric Grid: A Machine Learning Paradigm for Ensuring Stability in the U.S.A

    Md Rokibul Hasan
    2024-02-12
1 - 27 of 27 items

rightbar

Journal highlights
 
ISSN 2709-104X
DOI Prefix 10.32996/jcsts
Started 2021
Frequency Continuous
Language Multiple
APC $150

submission

Submit your article

menus

Find out more

Aims & scope
Call for Papers
Article Processing Charges
Publications Ethics
Google Scholar Citations
Recruitment

About Al-Kindi

Blog

Careers

Contact us

Further Information

Our awards

Our partners

Propose a special issue

EXPLORE

All journals

Publication ethics

Article processing charges

Keep up to date

  • Al Kindi Facebook
  • Al Kindi Twitter
  • Al Kindi LinkedIn
  • Al Kindi WhatsApp
  • Al Kindi Instagram

Copyright © 2024 Al-Kindi Center for Research and Development
3 Dryden Avenue, W7 1ES, Hanwell, London, UK | Registered in England & Wales No. 13110099