Skip to main content Skip to main navigation menu Skip to site footer
Publisher
  • About Al-Kindi
  • Our services
  • All journals
  • Our Partners
  • Publish with us
  • Register
  • Login

Journal of Computer Science and Technology Studies

Journal of Computer Science and Technology Studies
  • Journal Overview
    • About journal
    • Author's Guidelines
    • Article Processing Charges
    • Peer Review Process
    • Publication Ethics
    • Policies
    • Why Publish with us?
  • Editorial Team
  • Indexing
  • Latest issue
  • All issues
  • Announcements
  • Contact us
  1. Home /
  2. Search

Search

Related contents

About Journal
Latest issue
All issues
Submit your paper
Contact the journal
Advanced filters
Published After
Published Before

Search Results

  • Ethical Hacking and Penetration Testing – How Organizations Use Ethical Hackers to Strengthen Security

    Supom Roy, Ornab Banik
    2025-05-27
  • Cloud-Enabled Financial Services: Building Secure and Compliant Solutions with AWS and Spring Security

    Vijaya Kumar Katta
    2025-05-19
  • The Evolution and Societal Impact of Security Engineering in the Digital Age

    Imran Ahmed Shaik
    2025-06-07
  • Strengthening Digital Security: Dynamic Attack Detection with LSTM, KNN, and Random Forest

    Ansarullah Hasas, Mohammad Shuaib Zarinkhail, Musawer Hakimi, Mohammad Mustafa Quchi
    2024-01-03
  • AI-Driven Risk Assessment in National Security Projects: Investigating machine learning models to predict and mitigate risks in defense and critical infrastructure projects

    Md Habibul Arif, Habibor Rahman Rabby, Nusrat Yasmin Nadia, Md Iftekhar Monzur Tanvir, Abdullah Al Masum
    2025-04-05
  • A Comprehensive Analysis of Security Frameworks in Modern Cross-Border Payment Systems

    Nagaraju Unnava
    2025-05-15
  • Privacy - Preserving Technique in cybersecurity: Balancing Data Protection and User Rights

    Tanvir Rahman Akash, Nusrat Jahan Sany, Lamia Akter, Sanjida Akter Sarna
    2025-05-12
  • Cyber Security and Approaches of Institutions: A study on private institutions of Banani and Dhanmondi Thana area, Dhaka

    Shaira Matin, Md. Monwarul Islam
    2019-12-22
  • Unsecured Remote Desktop Protocol (RDP) Access: A Gateway for Ransomware Attacks and Corporate Extortion

    Surendra Vitla
    2024-05-23
  • Cyber Security Exploits and Management in Telecommunication Companies: The Case of Uganda

    Washington Okori, Sarah Buteraba
    2024-10-05
  • Collaborative Cyber Defense: A Framework for Purple Team Integration in Countering Sophisticated Adversaries

    Bhanu Prakash Reddy Mettu
    2025-06-10
  • AI-Driven Incident Response for Digital Forensics and Incident Response: A Comprehensive Framework

    Santosh Datta Bompally
    2025-04-25
  • Safeguarding OT Networks in Biotech Manufacturing Plants

    Prasanth Kosaraju
    2025-05-23
  • The Role of Blockchain in Banking Fraud Detection: Enhancing Security and Transparency

    Md Sumon Parvez, Mushfiqur Rashid Khan
    2025-04-24
  • AI-Based Intrusion Detection & Prevention Models for Smart Home IoT Systems: A Literature Review

    Jayveersinh Vansiya, Asha Chandi, Rashid A Khan
    2025-05-24
  • Detecting IoT Cyberattacks: Advanced Machine Learning Models for Enhanced Security in Network Traffic

    Md Rashed Buiya, A K M Nuruzzaman Laskar, Md Rafiqul Islam, Sanjib Kumar Shil, Muhammad Shoyaibur Rahman Chowdhury, Reza E Rabbi Shawon, Md Sumsuzoha
    2024-10-18
  • Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense

    Sunil Sukumaran Nair
    2024-01-14
  • Advanced Cyber Threats and Cybersecurity Innovation - Strategic Approaches and Emerging Solutions

    Jobanpreet Kaur, Syed Nazmul Hasan, Shuchona Malek Orthi, Md Alamgir Miah, Mohammad Abdul Goffer, Clinton Ronjon Barikdar, Jahid Hassan
    2023-07-20
  • Next-Generation Cyber Threat Detection and Mitigation Strategies: A Focus on Artificial Intelligence and Machine Learning

    Md Rasheduzzaman Labu, Md Fahim Ahammed
    2024-02-13
  • Unlocking Network Insights: Leveraging Statistics and AI for Anomaly and Trend Detection in Large-Scale Data

    Sree Priyanka Uppu
    2025-05-14
  • Convolutional Neural Networks Based Detection System for Cyber-attacks in Industrial Control Systems

    MD KHOKAN BHUYAN, Md Kamruzzaman, Sadia Islam Nilima , RABEYA KHATOON, Nur Mohammad
    2024-08-07
  • Cybersecurity in Autonomous and Connected Vehicles: A Systems-Level Threat Analysis and Resilience Framework

    Gopi Krishna Kommineni
    2025-06-09
  • Detection of Product Cost for Blind People Based on Android Application

    Rakibuzzaman, Pantho Datta, Tonny Roy, Nabil Hayat, MD Fazley Rabbe
    2023-10-02
  • Advancements in Privacy-Preserving Techniques for Patient Data Protection

    Kedar Mohile
    2025-05-07
1 - 24 of 24 items

rightbar

Journal highlights
 
ISSN 2709-104X
DOI Prefix 10.32996/jcsts
Started 2021
Frequency Continuous
Language Multiple
APC $150

submission

Submit your article

menus

Find out more

Aims & scope
Call for Papers
Article Processing Charges
Publications Ethics
Google Scholar Citations
Recruitment

About Al-Kindi

Blog

Careers

Contact us

Further Information

Our awards

Our partners

Propose a special issue

EXPLORE

All journals

Publication ethics

Article processing charges

Keep up to date

  • Al Kindi Facebook
  • Al Kindi Twitter
  • Al Kindi LinkedIn
  • Al Kindi WhatsApp
  • Al Kindi Instagram

Copyright © 2024 Al-Kindi Center for Research and Development
3 Dryden Avenue, W7 1ES, Hanwell, London, UK | Registered in England & Wales No. 13110099